The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy: SPIoT-2020, Volume 2 [1283, 1 ed.] 9783030627454, 9783030627461

This book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for I

1,594 119 42MB

English Pages 895 [887] Year 2020

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Foreword
Organization
General Chairs
Program Chairs
Publication Chairs
Publicity Chairs
Local Organizing Chairs
Program Committee Members
2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020)
Conference Program
Greeting Message
Conference Program at a Glance Friday, Nov. 6, 2020, Tencent Meeting9:50–10:00Opening ceremonyJinghua Zhao10:00–10:40Keynote 1: John Macintyre10:40–11:20Keynote 2: Junchi Yan11:20–11:40Best Paper AwardsXiaomeng Ma14:00–18:00Session 1Shunxiang ZhangSession 2Xianchao WangSession 3Xiao WeiSession 4Shaorong SunSession 5Ranran LiuSession 6Jun YeSession 7Qingyuan ZhouShort papers poster
SPIoT 2020 Keynotes
The Next Industrial Revolution: Industry 4.0 and the Role of Artificial Intelligence
Unsupervised Learning of Optical Flow with Patch Consistency and Occlusion Estimation
Oral Presentation Instruction
Short Paper Presentation Instruction
Registration
Contents
Data-Driven Co-design of Communication, Computing and Control for IoT Security
Design of a Force Balance Geophone Utilizing Bandwidth Extension and Data Acquisition Interface
1 Introduction
2 Single-Coil Force Balance Geophone
3 System Modeling and Analysis
3.1 System Modeling
3.2 System Analysis
4 Prototype Implementation and Test Results
5 Conclusion
References
Application of 3ds Max Technology in Archaeology
1 Introduction
2 Introduction to 3ds Max
3 The Specific Application in Archaeology
3.1 Topography of the Site
3.2 Stratum Overlying
3.3 Restoration of Artifacts
4 Conclusion
References
The Application of Virtual Reality Technology in ESP Teaching
Abstract
1 Introduction
2 VR Technology Overview
2.1 Definition of VR Technology
2.2 Characteristics of VR
3 The Advantages of VR Technology in ESP Teaching
3.1 Cost Saving
3.2 Avoid Risks
3.3 Expanding Space
4 The Application of VR Technology in ESP Teaching
4.1 Application of Information Processing
4.2 The VR Technology Application in the Improvement of ESP Learning
4.3 Store and Manage the Daily Behavior Data of College Students
4.4 VR Technology Realizes Operating Conditional Learning Theory
4.5 The Enhanced Stimulation of Operational Conditioning by VR Technology
5 Conclusion
References
Application of Simulation Method Based on Computer Bionic Design
1 Introduction
2 Computer Bionic Design
2.1 Basics of Bionic Design
2.2 Principles of Computer Bionic Design
2.3 Principles of Computer Bionics
3 Application of the Simulation Method in Product Design
3.1 The Essence of Product Design
3.2 The Simulation Method in Product Design
4 Application of the Simulation Method in Architecture Design
4.1 Application of the Simulation Method in Construction Outward Appearance Design of Architecture
4.2 Application of the Simulation Method in the Function Design of Architecture
4.3 Application of the Simulation Method in Structure Design of Architecture
5 Conclusion
References
The Implementation and Application of Computer Simulation Technology in PE Teaching
1 Introduction
2 Overview of Computer Simulation Technology
2.1 Basic Concepts of Computer Simulation Technology
2.2 Application of Computer Simulation Technology
2.3 The Main Flow of Computer Simulation Technology
3 Analysis on the Obstacle Factors of Computer Simulation Technology in Physical Education Teaching
3.1 The Practical Limits of Scientific and Technological Power
3.2 Interdisciplinary Communication is Difficult
3.3 The Defect of Educational Equipment
4 The Application of Computer Simulation Technology in the Field of Sports Science
4.1 The Application of Computer Simulation Technology in Physical Education Teaching
4.2 The Application of Computer Simulation Technology in Sports Training
5 The Implementation and Application of Computer Simulation Technology in Physical Education Teaching Practice
5.1 Increase the Application of Computer Simulation Technology in Classroom Teaching
5.2 The Application of Computer Simulation Technology in Sports Training is Introduced
5.3 The Application of Computer Simulation Technology is Introduced in the Connection of Teaching Plates
6 Conclusion
References
Construction of College Communities in the New Media Based on Network Environment
1 Introduction
2 Method
3 Research and Design of College Communities Construction Based on the Network New Media Environment
3.1 Research Methods
3.2 Questionnaire Design
4 Investigation and Analysis of the Effect of College Communities in the New Media Environment
4.1 Analysis of Application Effect by Popularity and Perceived Importance
4.2 Research Result
5 Conclusion
References
Political and Ideological Personnel Management Mode Based on Computer Network
1 Introduction
2 Analysis of the Reasons Affecting the Management Model of Political and Ideological Talents of College Students
3 Bayesian Network
4 New Trends in Talent Management Brought About by Changes in the Competitive Landscape of the Industry
5 Effective Ways of Political and Ideological Talents Management Based on Computer Network
6 Conclusion
References
Analysis of Mapping Knowledge Domain on Health and Wellness Tourism in the Perspective of Cite Space
1 Introduction
2 Research Methods and Data Sources
2.1 Research Methods [10–12]
2.2 Data Sources
3 Online Visual Analysis Based on Citespace V [10–12]
3.1 Analysis of Keyword Burstiness
3.2 Evolutionary Path of Research Subjects
4 Conclusion
References
Application of Smart Retail Mode in Suning.Com
1 Introduction
2 Importance of Traditional Retail Enterprises Opening Smart Retail Mode
3 Current Situation of the Application of Smart Retail Mode in Suning
3.1 Brief Introduction of Suning
3.2 Current Situation of Application of Smart Retail Mode in Suning
4 Problems in the Application of Smart Retail Mode in Suning
4.1 The Level of Using Network Marketing Tools is not High
4.2 Cost Pressure is Difficult to Relieve
4.3 Online Platforms and Offline Physical Stores Form a Zero-Sum Game
5 Improve the Application Strategy of Smart Retail Mode in Suning
5.1 The Application of Digital Technology has Provided Consumers with a Smart Retail Experience
5.2 Reconstruct the Formation Mechanism of Online and Offline Prices
5.3 Integration of Online and Offline to Promote the Development of Smart Retail
6 Conclusion
References
Construction and Development of High-Tech Smart City
1 Introduction
2 Construct the Framework and Characteristics of Smart City
2.1 Build the Architecture of Smart Cities
2.2 Main Features of Smart City Construction
2.3 Overview of Smart City Construction
3 Application of Iot Technology in Smart City
4 Conclusion
References
Design and Implementation of Self-service Tourism Management Information System Based on B/S Architecture
1 Introduction
2 Feasibility Analysis
2.1 Demand Analysis
2.2 Technical Analysis
2.3 Operational Analysis
3 System Design
3.1 System Module Design
3.2 System Main Class Design
3.3 System Database Design
4 System Function Implementation
4.1 Front-End Function Implementation
4.2 Back-End Function Implementation
4.3 System Test
5 Conclusion
References
Chinese Culture Penetration in Teaching Chinese as a Foreign Language in the Era of Mobile Internet
1 Introduction
2 Application Status of Internet Technology in Teaching Chinese as a Second Language
2.1 Combine Online and Offline Teaching to Change the Original Teaching Mode
2.2 Network Teaching Platform to Broaden the Chinese Learning Path
2.3 Chinese Learning APP Improves Chinese Learning Efficiency
3 The Practical Value of Internet Technology in Teaching Chinese as a Foreign Language
3.1 Combining Audio-Visual and Mobilizing the Senses
3.2 Repeatedly Watch and Deepen the Memory
3.3 Achieve Group Training by Country and Language Department
3.4 Improve the Efficiency of Inspection Operations
3.5 Efficient and Convenient Testing Methods
4 Innovative Research on O2O Chinese Culture Infiltration Model
4.1 Online Model of O2O Chinese Culture Infiltration Model for Teaching Chinese
4.2 Off-Line Model of O2O Chinese Culture Penetration Model for Teaching Chinese
5 Conclusion
References
Application and Outlook of Digital Media Technology in Smart Tourism
1 Introduction
2 Definition of Smart Tourism: “Smart Tourism” and “Smart City”
3 Digital Media Technology in Smart Tourism
3.1 Cloud Computing and Smart Tourism
3.2 IoT and Smart Tourism
3.3 Mobile Internet and Smart Tourism
3.4 Big Data Technology and Smart Tourism
4 Conclusion
References
Accounting Informationization in Computer Network Environment
1 Characteristics of Accounting Informationization in Computer Network Environment
1.1 Paperless
1.2 Openness
1.3 Diversification
1.4 Intelligent
2 The Impact of Computer Network Environment on Traditional Accounting
2.1 Impact on Accounting Assumptions
2.2 Impact on the Form of Accounting
2.3 Impact on Payment and Settlement Methods
3 The Construction Strategy of Accounting Information in the Computer Network Environment
3.1 Strengthening Awareness of Cyber Security Prevention
3.2 Improving the Level of Accounting Operations and Computer Operation Capabilities
3.3 The Establishment of Electronic Information Integration System
4 Conclusion
References
Mobile Phone GPS and Sensor Technology in College Students’ Extracurricular Exercises
1 Introduction
1.1 Research Background
1.2 Mobile Phone GPS and Sensor Technology
2 Experimental Methods and Steps
2.1 Experimental Methods
2.2 Experimental Step
3 Experimental Results
3.1 Helped Improve the Participation Rate of Students’ Extracurricular Exercises
3.2 Effectively Monitored Students’ Exercise Levels and Instructed Students to Exercise Scientifically
4 Conclusion
References
Design of Networking Network Model Based on Network Function Virtualization Technology
1 Introduction
2 Method
3 Experiment
3.1 Experiment Purpose
3.2 Subjects
3.3 Experimental Design
4 Discussion
4.1 Comparison of Different Access Mechanisms
4.2 Validation of Networking Model
5 Conclusion
References
Intelligent Media Technology Empowered Brand Communication of Chinese Intangible Cultural Heritage
1 Introduction
2 Background
3 Materials and Methods
3.1 All-Round Immersion Experience
3.2 Blended User Experience
3.3 Two-Way Interactive Experience
4 Results
4.1 Improve the Accuracy of Branded Communication
4.2 Refining Core Brand Symbols and Values
4.3 Strengthen the Development and Communication of Brand Ideas
4.4 Protecting the Intellectual Property of Communication Brands
5 Discussion
References
Construction Strategy of Smart English Teaching Platform from the Perspective of “Internet + Education”
1 Introduction
2 Method
2.1 Achieving “Hybrid” Coexistence of Multiple Learning Modes
2.2 Build a Personalized and Experiential Teaching Ecosystem
2.3 Establish an Interactive Platform for Teachers and Students
2.4 Install Auxiliary Composition Correction Software
3 Experiment
3.1 Experiment Purpose
3.2 Subjects
3.3 Experimental Design
4 Discussion
4.1 School English Teaching Concept
4.2 “Internet + Education” Massive Resources and Students’ Personalized English Learning
4.3 Satisfaction of Experimental and Control Classes
5 Conclusion
References
Online Writing Effectiveness Under the Blended Teaching Mode of Moscotech APP
1 Introduction
1.1 Definition of Blended Teaching Model
1.2 Moscotech APP
2 Blended Learning Model Construction Based on Moscotech APP
3 Teaching Research Design – Take English Writing as an Example
3.1 The Research Question
3.2 The Research Object
3.3 The Research Tools
3.4 Practice Effect and Reflection
3.5 Reflection on the Effect of Blended Learning
4 Conclusion
References
A Narrative Environment Model for the Sustainability of Intangible Cultural Heritage Under the 5G Era
1 Introduction
2 Literature Review
2.1 ICH in China
2.2 Digital Technology for Preserving ICH
2.3 Narrative Environment
3 Narrative Environment Model for ICH Exhibition
3.1 Narrative Environment Model
3.2 5G+Practical Contributions
4 Conclusion
References
Application Study of VPN on the Network of Hydropower Plant
1 Introduction
2 Characteristics of VPN
2.1 Wide Area of Intranet
2.2 Reduce Operation and Management Costs
2.3 Enhanced Security
2.4 Good Scalability
3 Classification and Use of VPN
3.1 Remote Access Virtual Network
3.2 Internal Virtual Network
3.3 Extended Virtual Network
4 Realization of Virtual Private Network
4.1 Security Technology of Virtual Private Network
4.2 Implementation of Virtual Private Network
5 Conclusion
References
Prediction of Technology Trend of Educational Robot Industry Based on Patent Map Analysis
1 Introduction
2 The Development Status of Educational Robots
3 Comparative Analysis of Key Technology of Education Robot Patent
3.1 Application of Patent Analysis Method in Technology Foresight
3.2 Comparative Analysis of Patent Technology Map Between China and World Education Robot Industry
4 Technology Trend Forecast of Educational Robot Industry
4.1 Theoretical Model
4.2 Education Robot Industry Patent Technology Life Cycle Forecast
5 Key Technologies for the Future of the Education Robot Industry
6 Conclusions
References
Coal Handling System of Power Plant Based on PLC
1 Introduction
2 Overall Design of Coal Transportation System
2.1 Design Task Analysis
2.2 Design of the Overall System Plan
3 Hardware Circuit Design
3.1 PLC Selection
3.2 Distributed I/O Selection
3.3 Selection of Anti-tear Sensor
3.4 Selection of Anti-deviation Sensor
4 Software Design
5 Host Computer Design
6 System Debugging
References
Discussion on the Construction of Wireless Campus Network Based on SDN Architecture
1 Preface
2 Overview of Key Technologies
2.1 CAPWAP
2.2 VXLAN
3 Architecture Analysis
4 Implementation Process
4.1 Wireless Controller
4.2 Sping Equipment
4.3 Director Configuration
5 Conclusion
References
Applicational Status Analysis of Artificial Intelligence Technology in Middle School Education and Teaching
1 Introduction
2 Application of Artificial Intelligence Technology in Middle School Education and Teaching
2.1 Artificial Intelligence Technology
2.2 Innovation and Development of Middle School Education and Teaching
3 Experimental Correlation Analysis
3.1 Experimental Background
3.2 Experimental Design
4 Discussion
4.1 Analysis of the Current Situation of Middle School Education and Teaching Based on Artificial Intelligence
4.2 Suggestions on the Development of Middle School Education and Teaching Based on Artificial Intelligence
5 Conclusions
References
Virtual Enterprise Partner Selection by Improved Analytic Hierarchy Process with Entropy Weight and Range Method
1 Introduction
2 Establishment of Virtual Enterprise
3 Standard Analytic Hierarchy Process (SAHP)
4 Improved Analytic Hierarchy Process (IAHP)
4.1 New Judgment Matrix Construction by Range Method
4.2 Weight Calculation Steps by Entropy Weight Method
4.3 Weight Optimization by Lagrange Multiplier Method (LMM)
5 Numerical Examples of Virtual Enterprise Partner Selection
6 Conclusion
References
Research and Implementation of Intelligent Tourism Guide System Based on Cloud Computing Platform
1 Introduction
2 Cloud Computing Overview
3 Crisis Design of Recommendation Algorithm Based on Tourists and Scenic Area Information
4 Demand Analysis of Tourism Guide System
4.1 The Design of Tour Guide System
5 Conclusions
References
Analysis of Financial Needs of New Agricultural Operators Based on K-Means Clustering Algorithm
1 Introduction
2 Whether Financial Support Promotes the Cultivation of New Agricultural Operation Subjects
3 Clustering
3.1 K Average Algorithm
4 Analysis of Financial Supply and Demand of New Agricultural Operation Subject
5 Conclusions
References
Research on the Application of Virtual Network Technology in Computer Network Security
1 Introduction
2 Current Development Situation of Virtual Network Technology in Computer Network Security
3 Influence Factors of Virtual Network Technology in Computer Network Security
3.1 Influencing Factors of Unauthorized Access
3.2 Natural Factors of Influencing Factors
3.3 Computer Virus Influencing Factors
3.4 Trojan Horse Program and Backdoor
4 Network Model of Virtual Network Mapping
5 Application of Virtual Network Technology in Computer Network Security
5.1 Application of Virtual Network Technology in Computer Network Security Between Customers and Enterprises
5.2 Application of Virtual Network Technology in Computer Network Security Between Enterprise Departments and Remote Departments
6 Conclusions
References
Application of Bionics in Underwater Acoustic Covert Communication
1 Introduction
1.1 Application Background
2 Existing Challenges and Suggested Solutions
2.1 Structure of the Paper
2.2 Related Work
3 Proposed Solutions
3.1 Noise Reduction and Extraction of Dolphin Calls
3.2 Underwater Acoustic Communication with Dolphin Whistle
3.3 Dolphin Click Underwater Communication
4 Conclusions
References
Energy-Saving and Efficient Underwater Wireless Sensor Network Security Data Aggregation Model
1 Introduction
2 Related Work
3 System Model
3.1 Network Model
3.2 Clustering
3.3 Data Slicing
3.4 Data Mixing
3.5 Data Aggregation
4 Model Analysis
4.1 Privacy Protection
4.2 Communication Cost
5 Conclusion
References
False Data Filtering in Underwater Wireless Sensor Networks
1 Introduction
2 Related Work
3 False Data Filtering Strategy Based on the Basis Nodes
3.1 Network Models and Related Assumptions
3.2 False Data Filtering Strategy Based on the Basis Nodes
4 Conclusions
References
Research on Underwater Bionic Covert Communication
1 Introduction
2 Underwater Covert Communication
2.1 Overview of Underwater Covert Communication
2.2 Research Status of Underwater Bionic Covert Communication
3 Discussion
4 Conclusion
References
Authentication and Access Control for Data Usage in IoT
The Application of Virtual Reality Technology in Architectural Design
1 Introduction
2 Overview Virtual Reality Technology
3 Characteristics of VR Technology
3.1 Immersion
3.2 Interactivity
3.3 Multi-sensitivity
4 Application of VR Technology in Architectural Design
4.1 Scientific and Accurate Analysis of Design Information
4.2 VR Realizes Dynamic Spatial Design
4.3 VR Implements the Whole-Process Auxiliary Design
4.4 VR Realizes Information System Design
4.5 VR Realizes the Presence of Architectural Expression
4.6 Interactive Application of VR in Architectural Experience
4.7 VR Realizes Creativity in Perception Activities
5 Conclusion
References
Computer-Assisted Teaching and Cultivate Students’ Innovative Thinking Ability
1 Introduction
2 The Application of Computer-Assisted Teaching
2.1 Computer-Aided Guidance to Students
2.2 The Application of Computer-Assisted Communication Between Students
2.3 Computer-Assisted Application in Teacher Teaching
2.4 Computer-Assisted Teaching Is Used in Problem Solving Process
3 Advantages of Computer-Assisted Teaching
3.1 The Richness of Educational Information Dissemination
3.2 The Efficiency of Educational Information Dissemination
3.3 Computer-Assisted Teaching Can Stimulate Students’ Enthusiasm for Learning
4 Computer-Assisted Teaching Trains Students’ Innovative Thinking
4.1 Establish a Computer-Assisted Teaching Quality Evaluation Mechanism
4.2 Establish a Computer-Aided Teaching Quality Monitoring Mechanism
4.3 Establish a Computer-Aided Teaching Quality Incentive Mechanism
4.4 Establish an Intercommunication System for Computer-Assisted Education Institutions
5 Conclusion
References
The Reform Progress and Practical Difficulties of State-Owned Hospitals Under Information Age—Case Analysis Based on the Reform in a Medical Institution of a Group in China
1 Introduction to the Reform of State-Owned Hospital
1.1 Enterprise Hospital
1.2 Difficulties in Development
1.3 History of the Reform
1.4 Reform Mode
2 Reform of Medical Institution of a Group
2.1 General Introduction
2.2 Overveiw of the Reform
2.3 Reform Pattern
2.4 Practical Difficulties
3 Reasonable Pathway for the Reform of State-Owned Hospitals
3.1 Integrate Internal Resource and Seize Market Opportunities
3.2 Seek Differential Development, and Fill the Gaps in Technology
3.3 Keep Pace with Medical Reform, Take Actions to Realize Transformation
References
Financing Efficiency of SMEs in New Third Board Market in the Information Times
1 Introduction
2 Theoretical Analysis and Research Hypothesis
2.1 Theoretical Analysis
2.2 Research Hypothesis
2.3 Indicators Selection
3 Statistical Description and Correlation Analysis of Samples
3.1 Statistical Description of Sample Variables
3.2 Relevance Analysis of Sample Variables
3.3 Regression Analysis of Financing Efficiency of SMEs in the New Third Board
4 Conclusion
References
Application of Virtual Instrument Technology in Electronic Course Teaching
1 Introduction
2 Introduction to Virtual Instrument Technology
3 Composition and Classification of Virtual Instruments
4 Performance Characteristics of Virtual Instruments
5 The Specific Application of Virtual Instrument Technology in Electronic Course Teaching
5.1 Research and Teaching
5.2 Electronic Curriculum System Aspect
5.3 Teaching Methodologies
5.4 Teaching Evaluation
References
A Solution for Internet of Things Based on Blockchain and Edge Computer
1 Introduction
2 The Related Technology
2.1 Blockchain
2.2 Edge Computer
3 The Structure of Interment of Things Based on Blockchain and Edge Computer
3.1 Perception Layer
3.2 Marginal Layer
3.3 Data Storage Layer
3.4 Application Layer
4 Data Processing and User Access
4.1 Data Processing
4.2 User Access
4.3 Production of New Block
5 Evolution
References
Discovery and Advice of Free Charging of Electronic Devices
1 Introduction
2 General Assumption
3 Model Design
3.1 Changes in Energy Consumption
3.2 The Cost Model
3.3 Cost Reduction Initiatives
4 Free Charging: Discovery and Advice
References
Design and Implementation of Tourism Information Management System Based on .NET
1 Introduction
2 System Requirements Analysis
2.1 The Promotion of Tourism Products Based on the Internet
2.2 Provide Links to Online Booking Services
2.3 Commercialization of Tourism Consumption
3 System Design
3.1 Overall System Design
3.2 Database Design of the System
3.3 Function Modules of the System
4 Conclusion
References
A Computer Model for Decision of Equipment Maintenance Spare Parts Reserve
1 Introduction
2 Analysis on the Decisive Calculation Model of Maintenance Spare Parts Reserve
2.1 Decision Analysis of Irreparable Spare Parts Reserve
2.2 Reserve of Repairable Spare Parts
2.3 Determining the Minimum Spare Parts Reserve According to the Time of the Spare Parts Lack for the First Time
3 Conclusion
References
Risk Level Determination of Science and Technology Service Supply Chain with PA-BP Integrated Model
1 Introduction
2 Literature
3 Risk Sources in Science and Technology Service Supply Chain
4 Establishment of Risk Level Determination Model
4.1 Design of Risk Level Determination Model for Science and Technology Service Supply Chain
4.2 Model Selection
5 Training and Testing
5.1 Model Training
5.2 Model Test
6 Conclusion
References
Evaluation of the New Engineering Course System for Cyberspace Security
1 Introduction
2 Background and Development of Cyberspace Security
3 Problems in Traditional Engineering Construction
4 Curriculum and Capability Evaluation of the New Engineering Course of Cyberspace Security
4.1 SCP-Based Curriculum System Construction Reference Model
4.2 OBE-Based Many-to-Many Curriculum Output Evaluation Model
5 Conclusion
References
Exploration on Teaching Reform of Architectural Design Courses from the Perspective of MOOCs
1 Introduction
2 Conceptual Interpretation and Characteristics Analysis of Moocs
2.1 Concept of MOOCs
2.2 Characteristics of MOOCs
3 Teaching Characteristics of Architectural Design Courses
3.1 Nature of Architectural Design Courses
3.2 Feasibility Exploration of Introducing MOOC into the Teaching Reform of Architectural Design Courses
4 Teaching Reform and Practice of Architectural Design Courses for MOOCs
4.1 Theoretical Teaching Reform of Architectural Design Courses Based on MOOCs
4.2 Practical Teaching Reform of Architectural Design Courses Based on MOOCs
4.3 Teaching Achievement Reform of Architectural Design Courses Based on MOOCs
5 Research Summary
References
Large-Scale Farmland Management on Improving Production Efficiency Under the Background of Smart Agriculture-Based on Panel Quantile Regression
1 Introduction
2 Data
3 Model Construction and Empirical Result
4 Conclusions and Recommendations
References
Impact of Alliance Fitness on Smart Phone Brand Alliance Based on Intelligent Application
1 Introduction
2 Theory and Hypothesis
2.1 Dimensions and Connotation of Brand Alliance Fitness
2.2 The Impact of Alliance Fitness on Brand Alliance Evaluation
3 Results
3.1 Experiment Design
3.2 Hypothesis Testing
4 Conclusions
4.1 Alliance Fitness Has Two Dimensions
4.2 Two Dimensions of Alliance Fitness Have Different Impacts on Brand Alliance
References
Effective Control Method of the Whole Process Project Cost Based on BIM
1 Introduction
2 Relevant Concepts of BIM and Project Cost
2.1 BIM Related Concepts
2.2 Relevant Concepts of Project Cost Management
3 BIM Based Whole Process Cost Control Process Method
4 Effect Analysis of Project Cost Control Based on BIM
5 Conclusion
References
Research and Design of FPGA Embedded System
1 Introduction
2 Design of FPGA Embedded System
2.1 Memory Selection
2.2 FIR Filter Algorithm Establishment and Optimization
2.3 Dynamic Measurement Signal Processing
3 The Experimental Research of FPGA Embedded System
3.1 Digital Filter Function
3.2 Implementation of Mutually Exclusive Hardware Access
3.3 Data Acquisition System
4 Experimental Analysis of FPGA Embedded System
4.1 Analysis of System Resource Usage
4.2 Sampling and Filtering Experiment Analysis
5 Conclusions
References
Multi-source Heterogeneous and XBOOST Vehicle Sales Forecasting Model
1 Introduction
2 Proposed Method
2.1 Multi-source Isomerism
2.2 Automobile Sales Forecasting Model
3 Experiments
3.1 Experimental Background
3.2 Experimental Design
4 Discussion
4.1 Analysis Based on Multi-source Heterogeneous and XBOOST Vehicle Sales Prediction Model
4.2 Recommendations Based on Multi-source Heterogeneous and XBOOST Vehicle Sales Forecasting Model
5 Conclusions
References
The Lorentz Component Algorithm for Calculating the Center of the Circular Motion of Charged Particles
1 Algorithm Overview
1.1 Parameter Setting
1.2 Algorithm Description
2 Algorithm Proof
2.1 Two-Line Algorithm
2.2 Verification of the Accuracy of the Obtained Circle Center Position
2.3 Left-Hand Rule Verification
3 Summary
References
Controller Design Based on LQR for Rotational Inverted Pendulum
1 Introduction
2 Build a Mathematical Model to System
3 Integrated Design Based on LQR
4 System Simulation
5 Conclusions
References
Three-Dimensional Scenic Spot Roaming System Based on Virtual Reality Technology
1 Introduction
2 Related Technologies of 3D Scenic Spot Roaming System
2.1 Image Feature Point Extraction and Matching Technology
2.2 Virtual Reality Roaming Based on Geometric Model
3 Experimental Background and Design
3.1 Experimental Background
3.2 Experimental Design
4 Discussion
4.1 System Testing
4.2 Development Characteristics of Virtual Reality Technology
5 Conclusions
References
Research and Development of Simulation System for Industrial Robot Stamping Automation Production Line Based on Virtual Reality
1 Introduction
2 Methods
2.1 Define Sports Synergy Evaluation Indicators
2.2 Virtual Prototype Simulation of Stamping Automated Production Line
3 Results and Discussions?
3.1 Analysis of Results of Exercise Coordination Program
3.2 Robot Trajectory Planning Method
4 Conclusion
References
Architectural Roaming Animation Based on VR Technology
1 Introduction
2 Architectural Tour Method
2.1 Virtual Reality
2.2 Collision Detection Technology
2.3 Automatic Navigation Pathfinding
3 Experimental Design of Roaming System
3.1 Overall Design of Roaming System
3.2 Experimental Environment
4 Discussion of Experimental Results of Roaming System
4.1 Analysis and Discussion of Experimental Results
4.2 Suggestions on Rational Use of Virtual Reality Technology in Architectural Animation
5 Conclusion
References
The Measurement Method of Housing Affordability
1 Introduction
1.1 House Price Income Ratio (PIR)
1.2 Rent to Income Ratio (RIR)
1.3 Residual Income Affordability (RIA)
1.4 Housing Affordability Index (HAI)
2 Comparative Analysis of Various Calculation Methods
3 Conclusion
References
Smart Home Security Based on the Internet of Things
1 History of Smart Home
2 Smart Home Security
2.1 Device Security
2.2 Communication Protocol Security
3 Challenges and Opportunities
3.1 Device Firmware Vulnerabilities
3.2 Communication Protocol Vulnerabilities
4 Conclusion
References
CS-Based Homomorphism Encryption and Trust Scheme for Underwater Acoustic Sensor Networks
1 Introduction
2 Related Work
3 Description of CHTS
3.1 Measurement Matrix
3.2 Trust Model
4 Discussion
4.1 Eavesdropping Attack
4.2 Selective Forwarding Attack
4.3 Dos Attack
5 Conclusion
References
3D Animation Scene Plane Design Based on Virtual Reality Technology
1 Introduction
2 3D Animation Scene Plane Design Based on Virtual Reality Technology
3 Experimental Results and Analysis
4 Conclusions
References
Design of VR Computer Network and Maintenance Experiment System
1 Introduction
2 Function Design of Multimedia Teaching System Simulation Experiment
3 Overview of Multimedia Teaching System Development Platform
4 Realize the Modeling and Development of Virtual Experiment Environment
5 The Ability to Reasonably Design the Interaction of Video Display Platform
5.1 Meet the Interactive Function of Moving Parts of Video Display Platform
5.2 Meet the Interactive Function of Moving Parts of Video Display Platform
6 Conclusions
References
The Quantum State Engineering by Adiabatic Decoherence-Free Subspace
1 Introduction
2 Model
3 Numerical Analysis
4 Conclusion
References
Design and Implementation of Training System for Broadcast Hosts P2P Network Video Live
1 Introduction
2 The Change of Information Transmission Mode Under the Influence of Network Live Broadcast
3 The Influence of Network Live Broadcast on the Cultivation of Broadcasting and Hosting Professionals
3.1 Positive Impact
3.2 Negative Effects
4 Solutions to the Influence of Network Live Broadcast on the Cultivation of Broadcasting and Hosting Professionals
5 Conclusions
References
Application Research of Enterprise Production Logistics System Based on Computer Simulation Technology
1 Introduction
2 The Importance of Simulation Technology in the Optimization of Production Logistics System
3 Optimization Analysis of Enterprise Production Logistics System Based on Computer Simulation Technology
3.1 The Concept of Computer Simulation Technology
3.2 The Steps of Computer Simulation Technology in the Optimization of Enterprise Production Logistics System
4 Real Time Simulation Algorithm
5 Research on the Influence of Computer Simulation Technology in the Optimization of Enterprise Production Logistics System
6 Conclusions
References
Atomic Decay-Based Clustering for Operation Log
1 Introduction
2 Related Works on Clustering
3 Operation Log and ADC
3.1 Properties of Operation Log
3.2 Data Sets from State Grid IT Operation Log
3.3 Operation Log Preprocessing
3.4 ADC Algorithm
4 Experiments
4.1 Experimental Settings
4.2 Performance Comparison of the Impact of Tagged Data on ADC and SC-Kmeans
4.3 Time Performance Comparison Between ADC and SC-Kmeans
5 Conclusions
References
Hybrid Mac Protocol Based on Security in Clustering Topology
1 Introduction
2 Related Work
3 Secure Clustering Algorithm Based on Energy and Trust Management
3.1 Clustering Algorithm
4 Hybrid Mac Protocol Based on Security in Clustering Topology
4.1 Intra-cluster Communication Key
4.2 Intra-cluster Broadcast Key
4.3 Secure Hybrid Mac Protocol
5 Analysis
References
Experiments, Test-Beds and Prototyping Systems for IoT Security
The Transformation and Remodeling of Literary Education Concept Under Mobile Internet Era
1 Introduction
2 The Opportunities Faced by Literary Education in the Era of Mobile Internet
2.1 The Era of Mobile Internet has Broadened the Horizons of College Students
2.2 The Mobile Internet has Changed the Literary Reading Mode of College Students
2.3 The Rise of Network Literature
3 Transformation and Remodeling of Literary Education Concepts in Universities
3.1 Educational Thinking Should Keep Pace with the Times
3.2 Improve the Relevant Curriculum System
3.3 Start with Teacher Teaching
3.4 Start from Students
4 Conclusion
References
Teaching Design Based on Network Red Blue Confrontation
1 Introduction
2 Problems Faced by Curriculum Teaching
2.1 The Cognitive Process of Dichotomy
2.2 Scene Design of Practice Link
2.3 Design Network Countermeasure Training Project
3 Build a Virtual Confrontation Experiment Platform
3.1 Using Virtual Machine to Set Up the Experiment Platform
3.2 Using Virtualization Technology to Build a Private Cloud Platform
4 Network Attack and Deployment of Network Defense
5 Conclusion
References
Construction and Implementation of the “Pyramid” Online Learning Platform for Experimental Teaching
1 Introduction
2 Present Situation of Experimental Teaching Informatization
2.1 Students’ Autonomous Learning
2.2 The Importance of Experimental Teaching
2.3 Problems of Existing Information Platforms for Experimental Teaching
3 Construction of the Student-Based “Pyramid” Online Learning Platform for Experimental Teaching
3.1 Student Oriented and Individualized Learning Environment
3.2 Platform Technology
3.3 Platform Process
4 Implementation of the Student-Based “Pyramid” Online Learning Platform
5 Conclusion
References
The Research on the Strategy of College English Teaching Mode Based on Mobile Terminal Under the Background of Internet+
1 Introduction
2 Overview of “Internet+”
3 Definition and Characteristics of Mobile Learning
3.1 Definition of Mobile Learning
3.2 Features of Mobile Learning
4 Analysis of the Status Quo of Mobile Terminal Education Development
5 Advantageous Application of Mobile Terminal Platform in College English
5.1 Not Limited by Time and Region
5.2 Personalized Customized Learning and Review Plan
5.3 Efficient Multi-dimensional Evaluation Tool
6 The Use of College English Teaching Based on Mobile Terminals
6.1 Integrate Traditional Teaching Methods and Network Teaching Methods
6.2 Break Through the Limitations of Time and Space
6.3 Reasonable Use of Mobile Terminal Teaching Software
7 Conclusion
References
The Research on College Physical Education Innovation Based on Internet and New Media
1 Introduction
2 The Internet Impact on College Physical Education
2.1 Internet + Overview
2.2 Optimizing Teaching Ideas and Improving College Physical Education Methods
2.3 Use Micro-classes to Innovate Classroom Teaching Content
3 Advantages of New Internet Media Applied in College Physical Education
3.1 Enriching the College Physical Education Environment
3.2 Strengthen the Exchange of Students and Teachers in College Physical Education
3.3 Help Students Improve Their Innovation Ability
4 Innovative Forms of College Physical Education from the New Internet Media Perspective
4.1 Internet New Media Sports Knowledge Enriches Teaching Resources
4.2 Internet New Media + Sports Practice Three-Dimensional Teaching Form
4.3 Internet New Media + Intelligent Teaching and Student Exchanges in Physical Education
5 Conclusion
References
The Development Strategy of College English Education Under the Language Education Planning in the Age of Artificial Intelligence
1 Introduction
2 Language Education Planning Concept
3 The Main Problems of College English Education Under the Language Education Planning in the Era of Artificial Intelligence
4 Analysis of the Contribution of Artificial Intelligence to English Education
4.1 Artificial Intelligence Helps to Implement in-Depth Education
4.2 Artificial Intelligence Improve the Scientific Nature of College English Education Management
4.3 Artificial Intelligence Drives Innovation in Teaching Models
5 Analysis of College English Education Development Strategy under the Language Education Planning in the Age of Artificial Intelligence
5.1 College English Education Deeply Integrates Artificial Intelligence
5.2 Establish a One-Stop System for English Teaching, and Plan Overall English Teaching in Primary and Secondary Schools and Colleges
5.3 English for Special Purposes as the Teaching Direction, and Train Professional Composite Talents with Strong English Proficiency
5.4 Optimize the Evaluation System, Focus on Formative Evaluation, and Establish a Comprehensive Evaluation System Based on Artificial Intelligence
6 Conclusion
References
Construction of Smart City Needed for a Better Life Under the Background of the Times—A Perspective of Holistic Governance Theory Based on Governance and the Structure of Local Political Institutions
1 Introduction
2 Password Mining: The Meaning of the Smart City
3 The Status Quo Sketch: Problems Existing in the Current Smart City Construction
3.1 Construction of Artificial Fengshui Mechanically Copied Suit
3.2 Fragmentation Lack of Integrated Construction
3.3 Game Imbalance Between Public Interest and Self-interest
3.4 Deregulation of Processes Leads to Bad Ends
4 Optimization Mechanism: The Construction of Smart Cities Requires External PEST and Internal SWOT Ecological Analysis
4.1 External Ecology—Exploration of the Proposed Smart City PEST
4.2 Internal Ecology—Consideration of SWOT for Smart City
5 Operation Strategy: SMART Concept Should Be Followed in the Construction of a Smart City
5.1 The Construction of a Smart City Needs to Integrate Resources and Be Clearly Positioned
5.2 The Construction of Smart Cities Must Be Quantifiable
5.3 Implementation of the Construction of a Smart City
5.4 The Construction of Smart Cities Must Coordinate the Relationship Between All Parties
5.5 The Construction of a Smart City Should not Neglect the Guarantee of Time
6 Reflective Discussion
References
Investigation on the Growth Mechanism of Small and Medium-Sized Agricultural Leading Enterprises from the Perspective of Intelligent Agricultural Niche Theory
1 Introduction
2 Method
2.1 Perspective of Intelligent Agriculture and Ecological Niche Theory
2.2 Leading AEs and Their Ecosystem
3 Investigation and Experiment on the Development of SMSA Leading Enterprises
4 Discuss
4.1 Experimental Results and Analysis
4.2 Improvement Strategies for the Growth Mechanism of Small and Medium-Sized Leading AEs
5 Conclusion
References
The Optimization and Construction of College English Teaching by Information Technology
1 Introduction
2 Problems Existing in the Teaching Based on Information Technology
2.1 The Software and Hardware Facilities Applied in Information Technology-Based Teaching Can not Keep up with Each Other
2.2 More Attention of Teaching Is Paid for Using the Information Technology Than the Teaching Content Itself
2.3 Lack Capacity for Teaching Resource Production and Integration
2.4 Lack Capacity to Collect, Analyze and Process Data
3 The Optimization of Teaching Process by Using Information Technology
3.1 Actively Create Internal and External Conditions Required for Information Technology-Based Teaching
3.2 Use Data Feedback from Teaching and Learning Software to Plan Teaching Goals and Tasks Rationally
3.3 Optimize and Refine Teaching Contents by Using Software and Internet Platforms
3.4 Set up Information Technology-Based Teaching Forms in a Reasonable Way
3.5 Effectively Integrate Various Information Technology Means to Optimize the Teaching Methods Applied in College English Courses
3.6 Utilize the Functions of Data Collection and Analysis in the Information Technology Software to Comprehensively Assess Teaching Effects
4 Conclusion
References
The Application of Computer Technology in Chinese Teaching for Foreign Students from the Perspective of Internet
1 Introduction
2 Concepts and Characteristics of Internet-Based Virtual Reality Technology
2.1 The Concept of Virtual Reality Technology
2.2 Features of Virtual Reality Technology
3 The Important Value of Applying Virtual Reality Technology to Teaching Chinese as a Foreign Language in Colleges and Universities
3.1 Help Students Better Acquire Foreign Language Knowledge
3.2 Strengthening Students’ Foreign Language Communication Skills Training
3.3 Effectively Motivate Students’ Verbal Communication Motivation
3.4 Reduce Students’ Foreign Language Anxiety
3.5 Breaking New Ground in Extracurricular Language Acquisition
4 Conclusion
References
The Application of Computer “Virtual Simulation” Experimental Teaching in Basic Football Tactics
1 Introduction
2 The Necessity of Applying Virtual Simulation Technology in the Teaching of Basic Football Tactics
2.1 Virtual Simulation Technology Is the New Development Trend in the Teaching of Basic Football Tactics
2.2 The Reality and Effectiveness of Virtual Simulation Technology in the Teaching of Basic Football Tactics
2.3 The Extension and Expansion of Traditional Teaching
3 Advantages of Virtual Simulation Experiments in the Teaching of Basic Football Tactics
3.1 Overcome Shortcomings in the One-Dimensional Teaching of Basic Attack and Defense Tactics
3.2 Help to Improve Students’ Learning Enthusiasm
3.3 Observation from Multiple Perspectives Can Provide Students Various Choices
3.4 Help to Improve Students’ Ability of Quickly Identifying Competition Scenes
3.5 Help to Improve the Efficiency of Football Teaching
4 The Application of Virtual Simulation Experiments in Football Tactics Teaching
4.1 Setting Virtual Learning Scenes According to Real Competitions
4.2 Building an Effective Teaching Mode
4.3 The “Trinity” Evaluation Mode
5 Analysis on the Effects of Virtual Simulation Experiment in Football Tactics Teaching
5.1 Effects of Learning Basic Football Tactics
5.2 Effects of Teaching Basic Football Tactics
6 Conclusion
References
Application of Campus Happy Running APP in the Reform of University Physical Education Integration
1 Introduction
1.1 Research Background
1.2 Research Status
1.3 Deficiencies
2 APPlication of App Software for Campus Trail Lepao
3 Construction and Promotion of Integrated Evaluation Model in and Out of Class
3.1 Construction of Integrated Evaluation Model Inside and Outside Class
3.2 Promotion of Integrated Evaluation Model in and Out of Class
4 Evaluation Effect Analysis After Introducing Trail Race
5 Conclusion
References
Data Mining of Educational Service Quality of Professional Degree Masters Based on Improved Expectation Confirmation Model
1 Introduction
2 Design of Quality Model of Professional Degree Master’s Education Service
2.1 Theoretical Model
2.2 Research Hypothesis
3 Measurement and Evaluation
3.1 Questionnaire Design
3.2 Research Method
3.3 Statistical Analysis
4 Measurement Results and Analysis
5 Conclusion
References
Intelligent Development of Urban Housing
1 Concept of Urban Housing Intelligence
2 Structural Composition of Urban Housing Intelligence
3 Problems in Housing Intelligence
4 Solution to the Problem of Housing Intelligence
5 Development Trend in Prospect
6 Conclusion
References
Effective Approach to Cultivating Physical Education Teaching Skills of Preschool Majors in the Context of Big Data
1 Introduction
2 Training and Improving the Teaching Design
2.1 Constructing the Online Classroom and Implementing Theoretical Framework
2.2 Reversed Teaching Design
2.3 Research on Teaching Materials
3 Standardize Technical Movements and Improve Sports Skills
4 Construct Comprehensive Physical Education Curriculum
4.1 Provide Demonstrations
4.2 Innovate PE Teaching Methods for Children
4.3 Development of Curriculum Resources
4.4 Teaching Practice
5 Learn to Evaluate
5.1 Evaluation of Learning Habits
5.2 Sports Load Evaluation
6 Developing Teaching and Research Abilities
7 Conclusion
References
Coordination Game in Online Ride-Hailing Market of Smart City
1 Introduction
2 Analysis on the Benefit Game in Online Ride-Hailing Market
3 Coordination Game Model in Online Ride-Hailing Market
3.1 Research Hypothesis
3.2 Analysis on the Government (Government) -Enterprise (Enterprise) Evolution Model
3.3 Analysis on the Enterprise (Enterprise) - Car Owner (User) Evolution Model
4 Conclusion
References
Construction of English Learning Community in the Smart City Environment
1 Introduction
2 Proposed Method
2.1 Construction of Smart City Learning Community
2.2 Strategies for Constructing English Learning Communities in Smart Cities
3 Research Method
4 Discussion
4.1 Lack of Awareness of Community Individual Participation
4.2 Unity of Community Activity Forms
5 Conclusions
References
Automatic Dispensing Technology of Traditional Chinese Medicine Formula Granules in Pharmacy Under the Background of Artificial Intelligence
1 Introduction
2 Proposed Method
2.1 Application of Artificial Intelligence to Traditional Chinese Medicine Formula Granules
2.2 Automatic Dispensing Technology of Dispensing Granules of Traditional Chinese Medicine
3 Experiments
4 Discussion
4.1 Key Technology Analysis of the Application of Automatic Dispensing Technology of Traditional Chinese Medicine Formula Granules in Pharmacy Under the Background of Artificial Intelligence
4.2 Analysis of Application Results of Automatic Dispensing Technology of Traditional Chinese Medicine Formula Granules in Pharmacy Under the Background of Artificial Intelligence
5 Conclusions
References
Exploration and Practice of Coaching Technology in College Career Guidance Under the Internet + Era
1 Introduction
2 Related Concept Description and Research Methods
2.1 Coaching Skills
2.2 Career Planning for College Students
2.3 Research Ideas and Methods
3 Applied Research Cases
3.1 Respondents
3.2 Experimental Design
4 Experimental Results and Discussion
4.1 Pretest Results and Analysis
4.2 Post-test Results and Analysis
5 Conclusion
References
Research on Enterprise Data Governance Based on Knowledge Map
1 Introduction
2 Data Governance
3 Visualized Analysis
3.1 The Status Quo of Research on Data Governance in China
3.2 The Status Quo of Research on Foreign Data Governance
4 Conclusion
References
Website Design and Implementation of Xunyang Lion’s Head Orange
1 Introduction
1.1 Research Background and Significance
1.2 Research Main Content
1.3 Research Methods
2 System Analysis
2.1 Functional Requirements Analysis
2.2 Analysis of Feasibility
2.3 Database Analytics
3 System Design
3.1 System Project Planning
3.2 Functional Module Design
3.3 Database Design
References
Vocational Students’ Academic Self-efficacy Improvement Based on Generative PAD Teaching Mode
1 Introduction
2 Relevant Research on the Academic Self-efficacy
2.1 Concept of Academic Self-efficacy
2.2 Relationship Between Academic Self-efficacy and Academic Performance
3 The Basic Structure of the Generative PAD Teaching Mode
3.1 The Concept of PAD Teaching Mode
3.2 The Generative Features of PAD Teaching Mode
4 Three Factors to Effect Academic Self-efficacy
4.1 Successful Direct Experience
4.2 High-Level Learning Motivation
4.3 Positive Verbal Evaluation
5 Model Construction of Generative PAD Teaching
5.1 Analyze Learners’ Needs
5.2 Define Teaching Objectives
5.3 Set up Teaching Resources
5.4 Create a Learning Environment
5.5 Perfect Teaching Evaluation
6 The Evaluation of Effect on Generative PAD Teaching Practice
6.1 Reliability Analysis of Questionnaire
6.2 The Post-test Analysis of Normal Class and Experimental Class
References
An Improved K-Means Clustering Algorithm Based on Density Selection
1 Introduction
2 Improved Clustering Algorithm Based on Density Selection
2.1 Cluster Validity Index
2.2 Selection of the Cluster Centers
2.3 The Improved K-Means Algorithm Based on Density Selection
3 The Experimental Results
4 Conclusion
References
Calculation and Analysis of Family Care Burden Coefficient
1 Introduction
1.1 Research Trends at Home and Abroad
1.2 Identification of Family Care Burden
2 Measurement of Family Care Burden Coefficient
2.1 Burden Coefficient of Family Support and Care
2.2 Burden Coefficient of Family Support and Care
2.3 Family Special Disability, Patient Population Care Coefficient
2.4 Total Burden Coefficient of Family Care
3 Conclusion
References
A Study on the Impact of Formal Social Support on the Mental Health of the Elderly in Urban and Rural China: Based on the 2015 CHARLS Data
1 Introduction
2 Data, Models and Analysis
2.1 Binary Probit Model
2.2 Classical Linear Regression Model
3 Conclusions
3.1 Formal Social Support Had a Significant Effect on the Degree of Depression in the Elderly
3.2 Formal Social Support also Had a Significant Effect on Cognition in the Elderly
References
Bi-Apriori-Based Association Discovery via Alarm Logs
1 Introduction
2 Related Works
2.1 Association Discovery
2.2 Process of Apriori Algorithm
2.3 Disadvantages of Apriori Algorithm
3 BI-APRIORI Algorithm
3.1 Preliminary Concepts
3.2 Equalization in Association Discovery
3.3 Algorithm Framework
3.4 Examples of Bi-Apriori Algorithm
4 Experiments
4.1 Retail DataSet
4.2 Mushroom DataSet
4.3 T10I4D100K DataSet
4.4 Alarm DataSet
5 Conclusions
References
Research on Perceived Information Model in Product Design Under Cloud Computing
1 Introduction
1.1 Research Background
1.2 Research Methods and Objectives
2 Literature Review
2.1 Perceptual Information of Intuitive Understanding
2.2 The Meaning and Operation Method of Dichotomy
3 Experimental Methods
3.1 Experiment
3.2 Construction of Perceptual Information
3.3 Analysis of Cooking Utensil Cluster
3.4 Quantitative Analysis of Perceptual Keywords
4 Conclusion
References
Early Warning Management of Enterprise Human Resource Crisis Based on Fuzzy Data Mining Algorithm of Computer
1 Introduction
2 An Overview of Human Resource Crisis in Enterprises
3 The Predicaments in the Early Warning Management of the Current Human Resource Crisis in Enterprises
4 Fuzzy Mining Algorithm
4.1 Set up the Sample Set u to Be Classified on All Data Records of the Data Warehouse
4.2 Establish Modulus Similarity R
4.3 Cluster Analysis
5 On Strengthening the Early Warning Management of Human Resource Crisis in Enterprises
6 Conclusions
References
New Media Creative Writing and Computer Application Technology
1 Introduction
2 Definition of New Media
3 Explore the Significance of the Application of Computer Technology in the New Media Era
4 New Media Creative Writing Environment and Current Situation
5 Abstraction of New Media Model
6 Cache Replacement Algorithm
7 Conclusions
References
Short Paper Session
Application of Automatic Obstacle Avoidance Unmanned Vehicle Based on Beidou and Inertial Navigation
1 Beidou + Dr
2 RFID Assisted Positioning
3 Obstacle Avoidance, Drive System
4 Conclusion
References
Application of “Computer Network Teaching Platform + Flipped Teaching Model” in Online Education-Taking “Information Technology Teaching Method” as an Example
1 Introduction
2 The Overview of “Computer Network Teaching Platform + Flipped Teaching Model”
3 Advantages of Using “Online Education Platform + Flipped Teaching Model” in Information Technology Teaching Method
3.1 Redesigning the Teaching Process Is More Conducive to Students’ Knowledge Construction
3.2 Provide a Variety of Teaching Media, Which Helps to Cultivate Students’ Interest in Learning
3.3 American Scholars Ference Marton and Roger Saljo Proposed in Essential Differences in Learning
3.4 Break the Space-Time Restrictions of Class and Improve the Interaction of Teaching
4 Conclusion
References
Design and Implementation of an Information Service System for Scientific and Technological Achievements Transformation Based on Spring Boot
1 Summary
2 Significance of Platform Research
3 System Design
3.1 Platform Topology
3.2 Platform Function Module Diagram
4 Key Technologies of System Implementation
4.1 Spring Boot
4.2 HTML5
4.3 Data Exchange
5 Conclusions
References
Design of Oral English Learning System Based on Cloud Computing
1 Introduction
2 The Overall Design of the System
2.1 System Architecture
3 Function Design of the System
4 System Learning System Design
4.1 Design of Speech Acquisition and Recognition Module
5 Conclusions
References
The Current Situations of Mobile Assisted Language Learning
1 Introduction
2 The Characteristics of Mobile Assisted Language Learning
3 The Merits of Mobile Assisted Language Learning
4 The Flaws of Mobile Assisted Language Learning
5 Summary
References
Development of Industrial Chain of Internet of Things Based on 5G Communication Technique
1 Introduction
2 Summarize of 5G Communication Technique
3 Impact of that the Internet of Things Industry Chain on 5G Communication Technique
3.1 Hardware Industry Develops Rapidly
3.2 Communication Standards are Gradually Unified
3.3 Extensive Application of Advanced Technique
4 Development of Internet of Things Industry Chain Under 5G Communication Technique
4.1 Smart Home
4.2 Construction Industry
4.3 Medical Field
5 5G Communication Technique is an Effective Strategy to Promote the Industrial Chain Development of the Internet of Things
5.1 Adjust the Deployment of Local Industrial Chain
5.2 Optimize the Development Plan of the Internet of Things
5.3 Strengthen Information Security Protection
6 Conclusion
References
Path Choice of Smart City Construction from the Perspective of Economic Growth
1 Introduction
2 Literature Review
3 Model
3.1 The Technological Progress Model of the US
3.2 The Technological Progress Model of China
4 Conclusion
References
Computer Audit Quality Control in Big Data Era
1 Impact of the Big Data Era on Computer Audit
1.1 The Impact of Computer Audit Methods
1.2 The Use of Big Data Helps Reduce Auditor Fraud
2 Problems in Computer Audit in the Era of Big Data
2.1 Audit Technical Issues
2.2 Audit Method Issues
2.3 Auditor Issues
3 The Countermeasures of Computer Audit Quality Control in the Era of Big Data
3.1 Improving Auditing Technology
3.2 Innovative Audit Methods
3.3 Enhance the Training of Audit Talents
4 Concluding Remarks
References
MOOC System in the Era of Big Data Improves the Effectiveness of College Physical Education
1 Introduction
2 Research Objects and Methods
2.1 Research Objects
2.2 Research Methods
3 Characteristics of MOOC System
4 Disadvantages of Traditional College Physical Education
5 Research Major Ideas and Innovations
6 The Practical Significance of Using MOOC System to Improve the Effectiveness of College Physical Education
6.1 Optimizing the Classroom Structure is the Key to Improve the Teaching Effect
6.2 To Improve the Effectiveness of Physical Education Classroom Teaching from the Perspective of Students’ Psychology
6.3 Teaching Methods Should be Effective
6.4 Strengthen the use of Effective Practices and Feedback
6.5 The Teaching Process Should be Interactive
6.6 Scientific Classroom Teaching Evaluation is the Guarantee to Improve the Teaching Effect
References
Risks and Prevention in the Application of AI
1 Introduction
2 Main Risks of AI Design and Application
2.1 Security Risks Caused by Artificial Intelligence
2.2 Risk of Consumer Privacy Disclosure
2.3 Moral Hazard in AI Design and Application
3 The Causes of Risks in AI Design and Application
3.1 Incomplete Laws and Regulations
3.2 Imperfect the Ways of Supervision and Relief
3.3 Limitations of Artificial Intelligence Technology Itself
4 Countermeasures of Risk Prevention
4.1 Perfecting Relevant Legislation
4.2 Improving the Supervision and Management System of Artificial Intelligence
4.3 Strengthening Safety Design to Reduce Risk from the Source
5 Conclusion
References
Improvement of Microblog Recommendation System Based on Interaction Strategies of Agricultural E-Commerce Enterprise
1 Introduction
2 Literature Review
2.1 RS in Microblogs
2.2 Microblog Interaction Strategy
2.3 Microblog Emotional Research
3 Research Design
3.1 Sample Sources
3.2 Data Collection and Processing
4 Research Process
4.1 Data Descriptive Statistics
4.2 Emotion Analysis
5 Conclusions
References
Exploration and Construction of “One Ring, Three Deductions” Innovation and Entrepreneurship Talent Cultivation Model for Higher Vocational Art Design Major Based on Information Technology
1 Introduction
2 Method
2.1 Existing Vocational Education Talent Training Models
2.2 Innovation of Training Mode of Innovative and Entrepreneurial Talents in Higher Vocational Colleges
3 Experiment
4 Discuss
5 Conclusion
References
Research Progress of Neuroimaging Techniques in Organizational Behavior Under the Background of Smart City
1 The Origin, Unique Role and Development of Organizational Behavior are Studied from the Perspective of Neuroscience
2 The Development Track and Introduction of Commonly Used Neuroimaging Techniques in Organizational Neuroscience
3 The Application Value of Neuroimaging Techniques in Organizational Behavior Research
References
Recommendation Strategies for Smart Tourism Scenic Spots Based on Smart City
1 Introduction
2 Smart City Tourism Recommendation Strategy
3 Research Method
4 Discussion
4.1 Clustering of Attractions
4.2 Experimental Analysis of Travel Recommendation Results
5 Conclusions
References
Control Strategy of Environmental Control System in Power Transmission
1 Introduction
2 Overview of Power Transmission and Environmental Control System
3 Application of Power Transmission Environmental Control System
4 Control Strategy of Power Transmission Environmental Control System
5 Conclusion
References
MATLAB Software in the Numerical Calculation of Civil Engineering
1 Introduction
2 Constitutive Model of Concrete
3 The Constitutive Relation of Reinforcement and the Bond Between Reinforcement and Concrete
4 Stress Analysis and Calculation Example of the Reinforced Concrete Simple Supported Beam
5 Analysis of Finite Element Results
6 Conclusions
References
Low Latency V2X Application of MEC Architecture in Traffic Safety
1 Introduction
2 MEC Architecture
3 C-V2X Networking
4 Application of Low Latency V2X in Traffic Safety
5 Summary
References
Cloud Computing Technology for the Network Resource Allocation on the Research of Application
1 Introduction
2 Cloud Computing Architecture Model
3 Cloud Computing Deployment Model
4 Cloud Computing Architecture
5 Key Technologies of Cloud Computing
6 Conclusions
References
Talent Evaluation Model of College Students Based on Big Data Technology
1 Introduction
2 Analysis on the Necessity and Feasibility of Big Data in the Field of College Students’ Talent Evaluation
2.1 Necessity Analysis
2.2 Feasibility Analysis
3 Implementation of Big Data Talent Evaluation
3.1 Early Stage of Talent Evaluation: Design Talent Evaluation Scheme Based on Big Data
4 The Conclusion and Enlightenment of the Research on the Model of College Students’ Talent Evaluation
4.1 Providing a Reference for the Career Planning and Personality Development of College Students
4.2 Providing Data Support for More Accurate Recruitment and Targeted Training for Enterprises
4.3 Providing Services for School Running and Improvement and Government Education Governance
References
Application of Cloud Class in Comprehensive English Teaching in the Context of Internet Plus
1 Introduction
2 Introduction of Cloud Class Teaching Platform
3 Current Situation of Comprehensive English Teaching
4 Application of Cloud Class in Comprehensive English Teaching
4.1 Guidance Before Class
4.2 Learning in Class
4.3 Consolidation After Class
5 Conclusion
References
The Application of 3D Printing Technology in Sculpture
1 Problems in Application of 3D Printing Technology
1.1 High Cost, Long Working Hours and Low Efficiency
1.2 Low Quality and Accuracy
1.3 Material Limits
2 Solutions to the Problems in the Application of 3D Printing Technology
2.1 Solutions to the Problems of High Cost, Long Working Hours and Low Efficiency
2.2 Solutions to the Problems of Low Quality and Accuracy
2.3 Solutions to the Problems of Material Limitations
3 Value and Advantages of Sculpture Technology in the Field of Sculpture
4 Conclusion
References
The Development Strategy of Current Medical Scientific Research Information
1 Introduction
2 Problems in the Management of Medical Scientific Research in Public Hospitals
2.1 Problems in Management Methods
2.2 Analysis of Some Abnormal Phenomena
2.3 The Dissemination of Scientific Research Information Is Blocked
2.4 The Management Personnel of the Department Do not Pay Enough Attention to Informatization
3 Conclusions
3.1 Development of Information Management Software
3.2 Establishment of Management System for Informatization Development
3.3 Establish Internal Information Sharing Mode
References
On the Development of the Industry Trend of “Ai+Education”
1 Introduction
2 All the Intelligent People in Education Create Lots of People
3 Third Party Education Service
4 Support for Standard Construction
5 Formation of Education Industry Chain
6 Conclusions
References
Research on UAV Control Improvement
1 Introduction
2 Introduction to the Internet of Things
3 Introduction to UAV Operation
4 Analysis of Current Situation at Home and Abroad
5 Basic Principle
6 Effectiveness of the Route
7 Improvement
8 Conclusion
References
Smart Sleep Mattress Based on Internet of Things Technology
1 Introduction
2 Introduction of Key Technologies
2.1 Introduction to the Internet of Things
2.2 Speech Recognition Technology
3 Structure of Smart Sleep Mattress System
3.1 Basic Functions of Ontology
3.2 Smart Mattress Structure
4 Specific Functions of Smart Sleep Mattress
4.1 Sleep Monitoring
4.2 Wake up
4.3 Manipulation Interaction
5 Conclusion
References
On the Application and Research of Electronic and Electrical Technology in Power System
1 Introduction
2 The Importance of the Application of Electronic and Electrical Technology
3 Application Strategy of Electrical and Electronic Technology in Power System
3.1 Power Generation Link
4 Transmission Link
5 Power Distribution Link
6 Conclusions
References
Driving the Application of Bioinformatics Under the Development of Cloud Technology
1 Introduction
2 Cloud Computing Definition
3 Application of Cloud Computing in Biological Information
3.1 IaaS
3.2 PaaS
3.3 SaaS
4 Problems Faced by Cloud Computing
5 Suggestions for Application of Cloud Computing
References
Computer Network Information Security and Protection Strategy Under the Background of Big Data
1 Introduction
2 Factors Affecting Computer Network Security Under the Background of Big Data Era
2.1 Natural Disaster
2.2 The Openness of Network Itself
2.3 Operation Error
2.4 Hacker Attack
2.5 Computer Virus Invasion
2.6 Spam and Information Theft
3 Analysis of Computer Network Security Protection Strategy Under the Background of Big Data Era
4 Ways to Use Network Security
4.1 Encryption of Data Preservation and Circulation
5 Conclusions
References
Design and Implementation of Legal Consultation System Based on Android Platform
1 Introduction
2 Feasibility Analysis of Legal Consultation System
3 Design of Legal Consultation System
4 System Function Test
5 Conclusions
References
The Application of Big Data Development in Power Engineering Cost
1 Introduction
2 Application Status of Information Technology in Power Engineering Cost in China
3 Problems Existing in the Application of Domestic Information Technology in the Cost of Electric Power Engineering
3.1 Incomplete Data of Power Cost Information Management
3.2 Information Management Method Is not Reasonable in the Process of Cost
3.3 Dynamic Cost Information Does not Form Monitoring Management, Resulting in Cost Out of Control
4 Main Measures to Effectively Improve These Application Problems
5 Application and Development Direction of Information Technology in Power Engineering Cost in the Future
6 Conclusions
References
Design and Research on the Management of the Electricity System of WebGIS
1 Introduction
2 WebGIS and Related Technologies
3 The Introduction of WebGIS Implementation Mode
4 System Analysis and Design
4.1 System Design Objectives
4.2 Use Case Model
4.3 Determination of User Object
5 Conclusions
References
Application of Improved CMAC Algorithm in International Trade Analysis Module Construction
1 Introduction
2 Function Demand Analysis of Trade Analysis Module
3 Application of CMAC Neural Network to the Construction of International Trade Module
3.1 Improved Algorithm Am-CMAC and Convergence Analysis
4 Design and Implementation of Customer Churn Analysis Module in International Trade
4.1 Design and Implementation of International Trade Segmentation Analysis Module
5 Conclusions
References
Design and Research of Electroless Copper Plating in Microelectronics
1 Introduction
2 Basic Principle of Electroless Copper Plating
2.1 Process Principle of Electroless Copper Plating
3 Application of Electroless Copper Plating in Electronic Industry
3.1 Conducting Treatment PTH for Through Hole and Inner Wall of Thin Tube
3.2 Inner Copper Foil Treatment
4 Electromagnetic Wave Shielding
4.1 Electronic Packaging Technology
5 Conclusions
References
Application of Neural Network Algorithm in Building Energy Consumption Prediction
1 Introduction
2 Neural Network and Its Algorithm
2.1 LM Algorithm
3 BP Network Model of Building Energy Consumption
3.1 Data Processing
3.2 Establishment of Prediction Model
4 Network Training
5 Conclusions
References
Research and Design of Big Data Unified Analysis Platform Based on Cloud Computing
1 He Coming of Big Data Era
2 Challenges in the Era of Big Data
2.1 Concept of Big Data
2.2 Problems in the Era of Big Data
3 Research and Design of Big Data Scheme Based on Cloud Computing
3.1 Design Idea of Big Data Unified Analysis Platform
3.2 Big Data Unified Analysis Platform Software Architecture
3.3 Advantage Analysis of Big Data Unified Analysis Platform
4 Empirical Analysis Based on Analytic Hierarchy Process
5 Conclusion
References
Computer Software Technology Under the Background of Big Data Development
1 Introduction
2 Analysis of the Development of Computer Software Technology in China
3 The Application of Computer Software Technology in the Era of Big Data
3.1 Virtualization Technology
3.2 Cloud Storage Technology
3.3 Information Security Technology
4 Notes on the Development of Computer Software Technology
4.1 Information and Communication Level
4.2 Analysis of Enterprise Information Solution
5 Conclusions
References
Application and Development of Digital Image Processing Technology in Jewelry Design
1 Introduction
2 Application of Digital Image Processing in Jewelry Cutting and Detection
2.1 Composition of the System
2.2 Features and Recognition Difficulties of Jewelry Image
3 Find Special Points
4 The Development of Digital Image Processing Technology in Jewelry Research
4.1 The Combination of Digital Image Processing and Microscopy
4.2 The Combination of Digital Image Processing and 3D Modeling Technology
5 Conclusions
References
Horizontal Model of Higher Education Management Policy Support System Based on Data Mining
1 Data Mining Technology
2 Data Mining and Educational Management Decision Support System
3 Construction of System Architecture
4 Looking Forward to the Future
References
Design and Implementation of Tourism Management System Based on SSH
1 The Technical Foundation of the SSH Integration Framework
1.1 MVC Mode
2 Demand Analysis of Tourism Management System
2.1 Requirements for the Construction of a Tourism Management System
2.2 Feasibility Analysis
3 Design of Tourism Management System
3.1 System Function Module Structure
3.2 System Database Design
4 Conclusions
References
Design and Research on Big Data Application of Web Convergence Media
1 Introduction
2 Internet Convergence Media in the Era of Big Data
3 Application Technology of Big Data in Internet Convergence Media
3.1 Big Data Acquisition Technology
4 Big Data Analysis Technology
4.1 The Big Data Analysis Method
4.2 Hadoop Big Data Support Platform
5 Conclusions
References
Design and Research of Wedding Photography Business System Based on Web
1 Introduction
2 The Market Concentration of the Wedding Photography Industry is Very High
3 Business System Overview
4 Data Analysis of Web Business System
5 System Target Requirements
5.1 System Structure Design
6 Conclusions
References
Development of a Virtual Experiment Teaching System Based on LabVIEW
1 Introduction
2 Comparison Between Virtual Instrument Experiment System and Traditional Experiment
3 The Construction of a Virtual Experiment System
4 Design of Signal Source Selection Module
4.1 The Effect of the Virtual Instrument Experiment System on the Reform of Experiment Teaching
5 Conclusions
References
Author Index
Recommend Papers

The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy: SPIoT-2020, Volume 2 [1283, 1 ed.]
 9783030627454, 9783030627461

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

Advances in Intelligent Systems and Computing 1283

John MacIntyre Jinghua Zhao Xiaomeng Ma   Editors

The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy SPIoT-2020, Volume 2

Advances in Intelligent Systems and Computing Volume 1283

Series Editor Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland Advisory Editors Nikhil R. Pal, Indian Statistical Institute, Kolkata, India Rafael Bello Perez, Faculty of Mathematics, Physics and Computing, Universidad Central de Las Villas, Santa Clara, Cuba Emilio S. Corchado, University of Salamanca, Salamanca, Spain Hani Hagras, School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK László T. Kóczy, Department of Automation, Széchenyi István University, Gyor, Hungary Vladik Kreinovich, Department of Computer Science, University of Texas at El Paso, El Paso, TX, USA Chin-Teng Lin, Department of Electrical Engineering, National Chiao Tung University, Hsinchu, Taiwan Jie Lu, Faculty of Engineering and Information Technology, University of Technology Sydney, Sydney, NSW, Australia Patricia Melin, Graduate Program of Computer Science, Tijuana Institute of Technology, Tijuana, Mexico Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro, Rio de Janeiro, Brazil Ngoc Thanh Nguyen , Faculty of Computer Science and Management, Wrocław University of Technology, Wrocław, Poland Jun Wang, Department of Mechanical and Automation Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong

The series “Advances in Intelligent Systems and Computing” contains publications on theory, applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all disciplines such as engineering, natural sciences, computer and information science, ICT, economics, business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the areas of modern intelligent systems and computing such as: computational intelligence, soft computing including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms, social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and society, cognitive science and systems, Perception and Vision, DNA and immune based systems, self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric computing, recommender systems, intelligent control, robotics and mechatronics including human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent data analysis, knowledge management, intelligent agents, intelligent decision making and support, intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia. The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings of important conferences, symposia and congresses. They cover significant recent developments in the field, both of a foundational and applicable character. An important characteristic feature of the series is the short publication time and world-wide distribution. This permits a rapid and broad dissemination of research results. ** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **

More information about this series at http://www.springer.com/series/11156

John MacIntyre Jinghua Zhao Xiaomeng Ma •



Editors

The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy SPIoT-2020, Volume 2

123

Editors John MacIntyre David Goldman Informatics Centre University of Sunderland Sunderland, UK

Jinghua Zhao University of Shanghai for Science and Technology Shanghai, China

Xiaomeng Ma Shenzhen University Shenzen, Guangdong, China

ISSN 2194-5357 ISSN 2194-5365 (electronic) Advances in Intelligent Systems and Computing ISBN 978-3-030-62745-4 ISBN 978-3-030-62746-1 (eBook) https://doi.org/10.1007/978-3-030-62746-1 © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Foreword

SPIoT 2020 is an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary agenda of Internet of Things. The “Internet of Things” heralds the connections of a nearly countless number of devices to the Internet thus promising accessibility, boundless scalability, amplified productivity, and a surplus of additional paybacks. The hype surrounding the IoT and its applications is already forcing companies to quickly upgrade their current processes, tools, and technology to accommodate massive data volumes and take advantage of insights. Since there is a vast amount of data generated by the IoT, a well-analyzed data is extremely valuable. However, the large-scale deployment of IoT will bring new challenges and IoT security is one of them. The philosophy behind machine learning is to automate the creation of analytical models in order to enable algorithms to learn continuously with the help of available data. Continuously evolving models produce increasingly positive results, reducing the need for human interaction. These evolved models can be used to automatically produce reliable and repeatable decisions. Today’s machine learning algorithms comb through data sets that no human could feasibly get through in a year or even a lifetime’s worth of work. As the IoT continues to grow, more algorithms will be needed to keep up with the rising sums of data that accompany this growth. One of the main challenges of the IoT security is the integration with communication, computing, control, and physical environment parameters to analyze, detect, and defend cyber-attacks in the distributed IoT systems. The IoT security includes: (i) the information security of the cyber space and (ii) the device and environmental security of the physical space. These challenges call for novel approaches to consider the parameters and elements from both spaces and get enough knowledge for ensuring the IoT’s security. As the data has been collecting in the IoT and the data analytics has been becoming mature, it is possible to conquer this challenge with novel machine learning or deep learning methods to analyze the data which synthesize the information from both spaces.

v

vi

Foreword

We would like to express our thanks to Professor John Macintyre, University of Sunderland, Professor Junchi Yan, Shanghai Jiaotong University, for being the keynote speakers at the conference. We thank the General Chairs, Program Committee Chairs, Organizing Chairs, and Workshop Chairs for their hard work. The local organizers’ and the students’ help are also highly appreciated. Our special thanks are due also to editors Dr. Thomas Ditzinger for publishing the proceedings in Advances in Intelligent Systems and Computing of Springer.

Organization

General Chairs Bo Fei (President)

Shanghai University of Medicine & Health Sciences, China

Program Chairs John Macintyre (Pro Vice Chancellor) Jinghua Zhao Xiaomeng Ma

University of Sunderland, UK University of Shanghai for Science and Technology, China Shenzhen University, China

Publication Chairs Jun Ye Ranran Liu

Hainan University, China The University of Manchester

Publicity Chairs Shunxiang Zhang Qingyuan Zhou

Anhui University Science and Technology, China Changzhou Institute of Mechatronic Technology, China

Local Organizing Chairs Xiao Wei Shaorong Sun

Shanghai University, China University of Shanghai for Science and Technology, China vii

viii

Organization

Program Committee Members Paramjit Sehdev Khusboo Pachauri Khusboo Jain Akshi Kumar Sumit Kumar Anand Jee Arum Kumar Nachiappan Afshar Alam Adil Khan Amrita Srivastava Abhisekh Awasthi Dhiraj Sangwan Jitendra Kumar Chaabra Muhammad Zain Amrit Mukherjee Nidhi Gupta Neil Yen Guangli Zhu Xiaobo Yin Xiao Wei Huan Du Zhiguo Yan Jianhui Li Yi Liu Kuien Liu Feng Lu

Wei Xu Ming Hu

Coppin State University, USA Dayanand Sagar University, Hyderabad, India Oriental University of Engineering and Technology, Indore, India Delhi Technological University, New Delhi, India Indian Institute of Technology (IIT), India Indian Institute of Technology (IIT), New Delhi, India Sastra Deemed University, Chennai, India Jamia Hamdard University, New Delhi, India Institute of Technology and Management, Gwalior, India Amity University, Gwalior, India Tshingua University, Beijing, China CSIR-CEERI, Rajasthan, India National Institute of Technology, Kurkshetra, India University of Louisville, USA Jiangsu University, China Institute of Automation, Chinese Academy of Sciences, Beijing, China University of Aizu, Japan Anhui Univ. of Sci. & Tech., China Anhui Univ. of Sci. & Tech., China Shanghai Univ., China Shanghai Univ., China Fudan University, China Computer Network Information Center, Chinese Academy of Sciences, China Tsinghua University, China Pivotal Inc, USA Institute of Geographic Science and Natural Resources Research, Chinese Academy of Sciences, China Renmin University of China, China Shanghai University, China

2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020)

Conference Program November 6, 2020, Shanghai, China Due to the COVID-19 outbreak problem, SPIoT-2020 conference will be held online by Tencent Meeting (https://meeting.tencent.com/).

Greeting Message SPIoT 2020 is an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary agenda of Internet of Things. The “Internet of Things” heralds the connections of a nearly countless number of devices to the Internet thus promising accessibility, boundless scalability, amplified productivity, and a surplus of additional paybacks. The hype surrounding the IoT and its applications is already forcing companies to quickly upgrade their current processes, tools, and technology to accommodate massive data volumes and take advantage of insights. Since there is a vast amount of data generated by the IoT, a well-analyzed data is extremely valuable. However, the large-scale deployment of IoT will bring new challenges and IoT security is one of them. The philosophy behind machine learning is to automate the creation of analytical models in order to enable algorithms to learn continuously with the help of available data. Continuously evolving models produce increasingly positive results, reducing the need for human interaction. These evolved models can be used to automatically produce reliable and repeatable decisions. Today’s machine learning algorithms comb through data sets that no human could feasibly get through in a year or even a lifetime’s worth of work. As the IoT continues to grow, more algorithms will be needed to keep up with the rising sums of data that accompany this growth. One of the main challenges of the IoT security is the integration with communication, computing, control, and physical environment parameters to analyze, detect, and defend cyber-attacks in the distributed IoT systems. The IoT security

ix

x

2020 International Conference on Machine Learning and Big Data Analytics

includes: (i) the information security of the cyber space and (ii) the device and environmental security of the physical space. These challenges call for novel approaches to consider the parameters and elements from both spaces and get enough knowledge for ensuring the IoT’s security. As the data has been collecting in the IoT, and the data analytics has been becoming mature, it is possible to conquer this challenge with novel machine learning or deep learning methods to analyze the data which synthesize the information from both spaces. We would like to express our thanks to Professor John Macintyre, University of Sunderland and Professor Junchi Yan, Shanghai Jiaotong University, for being the keynote speakers at the conference. We thank the General Chairs, Program Committee Chairs, Organizing Chairs, and Workshop Chairs for their hard work. The local organizers’ and the students’ help are also highly appreciated. Our special thanks are due also to editors Dr. Thomas Ditzinger for publishing the proceedings in Advances in Intelligent Systems and Computing of Springer.

Conference Program at a Glance

Friday, Nov. 6, 2020, Tencent Meeting 9:50–10:00 Opening ceremony 10:00–10:40 Keynote 1: John Macintyre 10:40–11:20 Keynote 2: Junchi Yan 11:20–11:40 Best Paper Awards 14:00–18:00 Session 1 Session 2 Session 3 Session 4 Session 5 Session 6 Session 7 Short papers poster

Jinghua Zhao

Xiaomeng Ma Shunxiang Zhang Xianchao Wang Xiao Wei Shaorong Sun Ranran Liu Jun Ye Qingyuan Zhou

xi

SPIoT 2020 Keynotes

The Next Industrial Revolution: Industry 4.0 and the Role of Artificial Intelligence John MacIntyre University of Sunderland, UK

Abstract. The fourth industrial revolution is already approaching—often referred to as “Industry 4.0”—which is a paradigm shift which will challenge our current systems, thinking, and overall approach. Manufacturing industry will be transformed, with fundamental changes possible in how supply chains work, and how manufacturing becomes agile, sustainable, and mobile. At the heart of this paradigm shift is communication, connectivity, and intelligent manufacturing technologies. Artificial intelligence is one of the key technologies that will make Industry 4.0 a reality—and yet very few people really understand what AI is, and how important it will be in this new industrial revolution. AI is all around us already—even if we don’t realize it! Professor John MacIntyre has been working in AI for more than 25 years and is Editor-in-Chief of Neural Computing and Applications, a peer-reviewed scientific journal publishing academic work from around the world on applied AI. Professor MacIntyre will give a picture of how Industry 4.0 will present both challenges and opportunities, how artificial intelligence will play a fundamental role in the new industrial revolution, and provide insights into where AI may take us in future.

xv

Unsupervised Learning of Optical Flow with Patch Consistency and Occlusion Estimation Junchi Yan Shanghai University, China

Junchi Yan is currently an Associate Professor in the Department of Computer Science and Engineering, Shanghai Jiao Tong University. Before that, he was a Senior Research Staff Member and Principal Scientist with IBM Research, China, where he started his career in April 2011. He obtained the Ph.D. in the Department of Electrical Engineering of Shanghai Jiao Tong University, China, in 2015. He received the ACM China Doctoral Dissertation Nomination Award and China Computer Federation Doctoral Dissertation Award. His research interests are mainly machine learning. He serves as an Associate Editor for IEEE ACCESS and a Managing Guest Editor for IEEE Transactions on Neural Networks and Learning Systems. He once served as Senior PC for CIKM 2019. He also serves as an Area Chair for ICPR 2020 and CVPR 2021. He is a Member of IEEE.

xvii

Oral Presentation Instruction

1. Timing: a maximum of 10 minutes total, including speaking time and discussion. Please make sure your presentation is well timed. Please keep in mind that the program is full and that the speaker after you would like their allocated time available to them. 2. You can use CD or USB flash drive (memory stick), make sure you scanned viruses in your own computer. Each speaker is required to meet her/his session chair in the corresponding session rooms 10 minutes before the session starts and copy the slide file(PPT or PDF) to the computer. 3. It is suggested that you email a copy of your presentation to your personal inbox as a backup. If for some reason the files can’t be accessed from your flash drive, you will be able to download them to the computer from your email. 4. Please note that each session room will be equipped with a LCD projector, screen, point device, microphone, and a laptop with general presentation software such as Microsoft PowerPoint and Adobe Reader. Please make sure that your files are compatible and readable with our operation system by using commonly used fronts and symbols. If you plan to use your own computer, please try the connection and make sure it works before your presentation. 5. Movies: If your PowerPoint files contain movies please make sure that they are well formatted and connected to the main files.

xix

xx

Oral Presentation Instruction

Short Paper Presentation Instruction 1. Maximum poster size is 0.8 meter wide by 1 meter high. 2. Posters are required to be condensed and attractive. The characters should be large enough so that they are visible from 1 meter apart. 3. Please note that during your short paper session, the author should stay by your short paper to explain and discuss your paper with visiting delegates.

Registration Since we use online meeting way, no registration fee is needed for SPIoT 2020.

Contents

Data-Driven Co-design of Communication, Computing and Control for IoT Security Design of a Force Balance Geophone Utilizing Bandwidth Extension and Data Acquisition Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaopeng Zhang, Xin Li, Tongdong Wang, and Weiguo Xiao

3

Application of 3ds Max Technology in Archaeology . . . . . . . . . . . . . . . Qiwang Zhao and Shaochi Pan

10

The Application of Virtual Reality Technology in ESP Teaching . . . . . . Xuehong Yuan

17

Application of Simulation Method Based on Computer Bionic Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bin Wang

24

The Implementation and Application of Computer Simulation Technology in PE Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Junhua Lu

30

Construction of College Communities in the New Media Based on Network Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Min Qiu

39

Political and Ideological Personnel Management Mode Based on Computer Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Siqi Pu

45

Analysis of Mapping Knowledge Domain on Health and Wellness Tourism in the Perspective of Cite Space . . . . . . . . . . . . . . . . . . . . . . . . Cheng Wang, Huifan Luo, and Ronghong Wang

53

xxi

xxii

Contents

Application of Smart Retail Mode in Suning.Com . . . . . . . . . . . . . . . . . Jinzhi Zhai

60

Construction and Development of High-Tech Smart City . . . . . . . . . . . Quan Liu

68

Design and Implementation of Self-service Tourism Management Information System Based on B/S Architecture . . . . . . . . . . . . . . . . . . . Yue Meng, Jing Pu, and Wenkuan Chen

74

Chinese Culture Penetration in Teaching Chinese as a Foreign Language in the Era of Mobile Internet . . . . . . . . . . . . . . . . . . . . . . . . . Ying Liu

82

Application and Outlook of Digital Media Technology in Smart Tourism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jing Pu

90

Accounting Informationization in Computer Network Environment . . . Shirong Qin

97

Mobile Phone GPS and Sensor Technology in College Students’ Extracurricular Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Zhikai Cao Design of Networking Network Model Based on Network Function Virtualization Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Jin Bao Intelligent Media Technology Empowered Brand Communication of Chinese Intangible Cultural Heritage . . . . . . . . . . . . . . . . . . . . . . . . . 115 Lei Cui and Xiaofen Shao Construction Strategy of Smart English Teaching Platform from the Perspective of “Internet + Education” . . . . . . . . . . . . . . . . . . . 122 Zhenhua Wei Online Writing Effectiveness Under the Blended Teaching Mode of Moscotech APP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 Juan Qian A Narrative Environment Model for the Sustainability of Intangible Cultural Heritage Under the 5G Era . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Chen Qu, Ting Zhao, and Wei Ding Application Study of VPN on the Network of Hydropower Plant . . . . . 143 Wenju Gao Prediction of Technology Trend of Educational Robot Industry Based on Patent Map Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Yue Wu and Jian Fang

Contents

xxiii

Coal Handling System of Power Plant Based on PLC . . . . . . . . . . . . . . 156 Zhijie Zhang Discussion on the Construction of Wireless Campus Network Based on SDN Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Dongqing Hou Applicational Status Analysis of Artificial Intelligence Technology in Middle School Education and Teaching . . . . . . . . . . . . . . . . . . . . . . . 171 Zhi Cheng Virtual Enterprise Partner Selection by Improved Analytic Hierarchy Process with Entropy Weight and Range Method . . . . . . . . . . . . . . . . . 179 Junfeng Zhao and Xinyi Huang Research and Implementation of Intelligent Tourism Guide System Based on Cloud Computing Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Xu Yan and Zhao Juan Analysis of Financial Needs of New Agricultural Operators Based on K-Means Clustering Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 Xiaohui Li Research on the Application of Virtual Network Technology in Computer Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Zhou Yun and Lu Rui Application of Bionics in Underwater Acoustic Covert Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Kaiwei Lian, Jiaqi Shen, Xiangdang Huang, and Qiuling Yang Energy-Saving and Efficient Underwater Wireless Sensor Network Security Data Aggregation Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Shijie Sun, Dandan Chen, Na Liu, Xiangdang Huang, and Qiuling Yang False Data Filtering in Underwater Wireless Sensor Networks . . . . . . . 217 Na Liu, Haijie Huang, Xiangdang Huang, and Qiuling Yang Research on Underwater Bionic Covert Communication . . . . . . . . . . . . 223 Jiaqi Shen, Kaiwei Lian, and Qiuling Yang Authentication and Access Control for Data Usage in IoT The Application of Virtual Reality Technology in Architectural Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Lili Peng, Yihui Du, and Zijing Zhang Computer-Assisted Teaching and Cultivate Students’ Innovative Thinking Ability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Feng Gao

xxiv

Contents

The Reform Progress and Practical Difficulties of State-Owned Hospitals Under Information Age—Case Analysis Based on the Reform in a Medical Institution of a Group in China . . . . . . . . . 243 Yilong Wang, Hongjie Bao, Xuemei Zhang, and Aihong He Financing Efficiency of SMEs in New Third Board Market in the Information Times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 Sheng Li and Aihua Zhang Application of Virtual Instrument Technology in Electronic Course Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 Hui Cheng A Solution for Internet of Things Based on Blockchain and Edge Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264 Yan Zhou Discovery and Advice of Free Charging of Electronic Devices . . . . . . . . 271 Yuhang Du and Chen Wang Design and Implementation of Tourism Information Management System Based on .NET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 Yue Meng, Jing Pu, and Wenkuan Chen A Computer Model for Decision of Equipment Maintenance Spare Parts Reserve . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 Yunxing Wang, Weishan Zhou, Jingjing Zhao, and Mengwei Wang Risk Level Determination of Science and Technology Service Supply Chain with PA-BP Integrated Model . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 JinHua Sun, Linlin Xu, and Xiang Guo Evaluation of the New Engineering Course System for Cyberspace Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 Xinxin Lin, Wei Wang, and Kainan Wang Exploration on Teaching Reform of Architectural Design Courses from the Perspective of MOOCs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309 Qian Yu Large-Scale Farmland Management on Improving Production Efficiency Under the Background of Smart Agriculture-Based on Panel Quantile Regression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315 Bangzheng Wu Impact of Alliance Fitness on Smart Phone Brand Alliance Based on Intelligent Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321 Fang Wu, Ying Yang, Qi Duan, and Heliang Song

Contents

xxv

Effective Control Method of the Whole Process Project Cost Based on BIM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 Linlin Yu Research and Design of FPGA Embedded System . . . . . . . . . . . . . . . . . 333 Dandan Jiang Multi-source Heterogeneous and XBOOST Vehicle Sales Forecasting Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340 Fan Zhang, Jing Yang, Yaxin Guo, and Hongjian Gu The Lorentz Component Algorithm for Calculating the Center of the Circular Motion of Charged Particles . . . . . . . . . . . . . . . . . . . . . 348 Chaoyue Jin Controller Design Based on LQR for Rotational Inverted Pendulum . . . 354 Dong Wang, Xinjun Wang, and Liang Zhang Three-Dimensional Scenic Spot Roaming System Based on Virtual Reality Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360 Yujuan Yan, Shuo Wang, Jialin Li, and Suyang Li Research and Development of Simulation System for Industrial Robot Stamping Automation Production Line Based on Virtual Reality . . . . . 367 Songqing Liu and Ying Chen Architectural Roaming Animation Based on VR Technology . . . . . . . . . 374 Heng Yang The Measurement Method of Housing Affordability . . . . . . . . . . . . . . . 381 Fang Yang and Lingni Wan Smart Home Security Based on the Internet of Things . . . . . . . . . . . . . 388 Kejie Zhao, Jiezhuo Zhong, and Jun Ye CS-Based Homomorphism Encryption and Trust Scheme for Underwater Acoustic Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . 394 Kun Liang, Haijie Huang, Xiangdang Huang, and Qiuling Yang 3D Animation Scene Plane Design Based on Virtual Reality Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400 Min Zhang Design of VR Computer Network and Maintenance Experiment System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405 Fancheng Fu, Mei Yang, and Xiaofang Tan The Quantum State Engineering by Adiabatic Decoherence-Free Subspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410 Yue Gao, Yifan Ping, and Zhongju Liu

xxvi

Contents

Design and Implementation of Training System for Broadcast Hosts P2P Network Video Live . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415 Yuzao Tan Application Research of Enterprise Production Logistics System Based on Computer Simulation Technology . . . . . . . . . . . . . . . . . . . . . . 420 Zhou Gan Cui Atomic Decay-Based Clustering for Operation Log . . . . . . . . . . . . . . . . 426 Ren Guo, Jue Bo, Guoxian Dou, Yang Bo, and Qiong Wang Hybrid Mac Protocol Based on Security in Clustering Topology . . . . . . 439 Wei Dong, Yanxia Chen, Xiangdang Huang, and Qiuling Yang Experiments, Test-Beds and Prototyping Systems for IoT Security The Transformation and Remodeling of Literary Education Concept Under Mobile Internet Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447 Xiaowei Dong and Jie Zhao Teaching Design Based on Network Red Blue Confrontation . . . . . . . . . 453 Guofang Zhang and Lili Yan Construction and Implementation of the “Pyramid” Online Learning Platform for Experimental Teaching . . . . . . . . . . . . . . . . . . . . . . . . . . . 459 Bingjie Zhu, Tongna Shi, Zhenjiang Shi, and Wenhua Wu The Research on the Strategy of College English Teaching Mode Based on Mobile Terminal Under the Background of Internet+ . . . . . . 468 Rongjian Li The Research on College Physical Education Innovation Based on Internet and New Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474 Bin Dai The Development Strategy of College English Education Under the Language Education Planning in the Age of Artificial Intelligence . . . . . 480 Xiangying Cao Construction of Smart City Needed for a Better Life Under the Background of the Times—A Perspective of Holistic Governance Theory Based on Governance and the Structure of Local Political Institutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487 Dan Li and Kexin Yang Investigation on the Growth Mechanism of Small and Medium-Sized Agricultural Leading Enterprises from the Perspective of Intelligent Agricultural Niche Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494 Haohao Li and Nan Zhou

Contents

xxvii

The Optimization and Construction of College English Teaching by Information Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500 Jun Chen The Application of Computer Technology in Chinese Teaching for Foreign Students from the Perspective of Internet . . . . . . . . . . . . . . 507 Bingjie Han The Application of Computer “Virtual Simulation” Experimental Teaching in Basic Football Tactics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514 Xiaowei Di and Huhu Lian Application of Campus Happy Running APP in the Reform of University Physical Education Integration . . . . . . . . . . . . . . . . . . . . . 523 Yuanhai Liu and Yong Liu Data Mining of Educational Service Quality of Professional Degree Masters Based on Improved Expectation Confirmation Model . . . . . . . 529 Yu Xiang and Jianmin Liu Intelligent Development of Urban Housing . . . . . . . . . . . . . . . . . . . . . . . 536 Tingyong Wang, Yuweng Zhu, Fengjuan Zhang, and Wei Zhao Effective Approach to Cultivating Physical Education Teaching Skills of Preschool Majors in the Context of Big Data . . . . . . . . . . . . . . . . . . . 544 Baolong Wang Coordination Game in Online Ride-Hailing Market of Smart City . . . . 551 Qi Duan Construction of English Learning Community in the Smart City Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558 Liying Gao Automatic Dispensing Technology of Traditional Chinese Medicine Formula Granules in Pharmacy Under the Background of Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566 Wenjing Wang Exploration and Practice of Coaching Technology in College Career Guidance Under the Internet + Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573 Zenglu Meng Research on Enterprise Data Governance Based on Knowledge Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581 Xiaoying Qi Website Design and Implementation of Xunyang Lion’s Head Orange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587 YongHui Ma

xxviii

Contents

Vocational Students’ Academic Self-efficacy Improvement Based on Generative PAD Teaching Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593 Yaya Yuan An Improved K-Means Clustering Algorithm Based on Density Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601 Wenhao Xie, Xiaoyan Wang, and Bowen Xu Calculation and Analysis of Family Care Burden Coefficient . . . . . . . . . 608 Lingni Wan A Study on the Impact of Formal Social Support on the Mental Health of the Elderly in Urban and Rural China: Based on the 2015 CHARLS Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 614 Dongfang Li Bi-Apriori-Based Association Discovery via Alarm Logs . . . . . . . . . . . . 621 Feng Yao, Ang Li, and Qiong Wang Research on Perceived Information Model in Product Design Under Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633 Qiangqiang Fan and SungEun Hyoung Early Warning Management of Enterprise Human Resource Crisis Based on Fuzzy Data Mining Algorithm of Computer . . . . . . . . . . . . . . 640 Hua Wu New Media Creative Writing and Computer Application Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 646 Xiaoci Yang Short Paper Session Application of Automatic Obstacle Avoidance Unmanned Vehicle Based on Beidou and Inertial Navigation . . . . . . . . . . . . . . . . . . . . . . . . 655 Pan Li, ZhengJiang Pang, LiZong Liu, Wei Meng, and LiPing Zhang Application of “Computer Network Teaching Platform + Flipped Teaching Model” in Online Education-Taking “Information Technology Teaching Method” as an Example . . . . . . . . . . . . . . . . . . . . 660 Qingchuan Gu, Yao Zhang, and Haiyan Yang Design and Implementation of an Information Service System for Scientific and Technological Achievements Transformation Based on Spring Boot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665 Jiayin Song

Contents

xxix

Design of Oral English Learning System Based on Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 670 Tong Shen The Current Situations of Mobile Assisted Language Learning . . . . . . . 675 Guihua Ma Development of Industrial Chain of Internet of Things Based on 5G Communication Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680 Yanping Chen and Minghui Long Path Choice of Smart City Construction from the Perspective of Economic Growth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685 Lingyu Chi Computer Audit Quality Control in Big Data Era . . . . . . . . . . . . . . . . . 690 Lingling Jiang MOOC System in the Era of Big Data Improves the Effectiveness of College Physical Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695 Jianfeng Zhang and Xuxiu Gao Risks and Prevention in the Application of AI . . . . . . . . . . . . . . . . . . . . 700 Hongzhen Lin and Wei Liu Improvement of Microblog Recommendation System Based on Interaction Strategies of Agricultural E-Commerce Enterprise . . . . . . . 705 Xu Zu, Yangyang Long, Renji Duan, and Qingxin Gou Exploration and Construction of “One Ring, Three Deductions” Innovation and Entrepreneurship Talent Cultivation Model for Higher Vocational Art Design Major Based on Information Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710 Bingjie Liu and Yawen Tang Research Progress of Neuroimaging Techniques in Organizational Behavior Under the Background of Smart City . . . . . . . . . . . . . . . . . . . 715 Shimin An and Zhen Zhang Recommendation Strategies for Smart Tourism Scenic Spots Based on Smart City . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720 Peilin Chen Control Strategy of Environmental Control System in Power Transmission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725 Pin Xia MATLAB Software in the Numerical Calculation of Civil Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 730 Xiaowen Hu and Qiang Zhou

xxx

Contents

Low Latency V2X Application of MEC Architecture in Traffic Safety . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 735 Zunyi Shang Cloud Computing Technology for the Network Resource Allocation on the Research of Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 740 Gen Zhu and Xiang Fang Talent Evaluation Model of College Students Based on Big Data Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745 Lei Tan and Yi Guan Application of Cloud Class in Comprehensive English Teaching in the Context of Internet Plus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 750 Linhui Wu The Application of 3D Printing Technology in Sculpture . . . . . . . . . . . . 755 Jingxue Yu The Development Strategy of Current Medical Scientific Research Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 760 Qingxi Huang and Peng Ruan On the Development of the Industry Trend of “Ai+Education” . . . . . . . 765 Dongmei Liang Research on UAV Control Improvement . . . . . . . . . . . . . . . . . . . . . . . . 769 Moude Yang, Jiezhuo Zhong, and Longjuan Wang Smart Sleep Mattress Based on Internet of Things Technology . . . . . . . 773 Yi Yue, Jiezhuo Zhong, and Longjuan Wang On the Application and Research of Electronic and Electrical Technology in Power System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 777 Xiaoyun Sun Driving the Application of Bioinformatics Under the Development of Cloud Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 782 Cui Yingying Computer Network Information Security and Protection Strategy Under the Background of Big Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . 787 Liu Guanxiu Design and Implementation of Legal Consultation System Based on Android Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 792 Xiaoyu Lu

Contents

xxxi

The Application of Big Data Development in Power Engineering Cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 797 Wang Linfeng, Dong Zhen, Wang Yanqin, Wang Yong, and Wang Dongchao Design and Research on the Management of the Electricity System of WebGIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801 Wu Jianhui and Meng Xiangnan Application of Improved CMAC Algorithm in International Trade Analysis Module Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 806 Zhendong Zhu Design and Research of Electroless Copper Plating in Microelectronics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 811 Dong Zhenhua and Li Xiaoming Application of Neural Network Algorithm in Building Energy Consumption Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 816 Mao Yueqiang Research and Design of Big Data Unified Analysis Platform Based on Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821 Zhen Zhiming Computer Software Technology Under the Background of Big Data Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 826 Lv Ying and Zhang Zhifeng Application and Development of Digital Image Processing Technology in Jewelry Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 831 Xinyi Yang Horizontal Model of Higher Education Management Policy Support System Based on Data Mining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836 Jin Chen Design and Implementation of Tourism Management System Based on SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 841 Baojian Cui, Xiaochun Sun, and Yuhong Chen Design and Research on Big Data Application of Web Convergence Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 846 Yingmin Cui Design and Research of Wedding Photography Business System Based on Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851 Bing Liu

xxxii

Contents

Development of a Virtual Experiment Teaching System Based on LabVIEW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 856 Saying Ren Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 861

Data-Driven Co-design of Communication, Computing and Control for IoT Security

Design of a Force Balance Geophone Utilizing Bandwidth Extension and Data Acquisition Interface Xiaopeng Zhang(B) , Xin Li, Tongdong Wang, and Weiguo Xiao Northwest Institute of Nuclear Technology, Xi’an 710024, China [email protected]

Abstract. This paper reports on the design, simulation and hardware implementation of a force balance geophone comprising a high order M with the proportional-integral-derivative (PID) feedback loop. The system is simulated and analyzed by Simulink modeling, and obtains a low-frequency and stable system. The prototype engages a conventional low cost 4.5 Hz SM-6 geophone cascaded by two distributed feedback (DF) electronic integrators for high-order noise shaping. Our resulting force balance geophone confirms an extended bandwidth to 0.16 Hz √ and a simulated NEA of 17 ng/ Hz. These performances shows its potential for highly effective and low-cost seismic exploration. Keywords: Force balance geophone · Bandwidth extension · Data acquisition interface · Exploration

1 Introduction Deep Earth seismic explorations require geophones to have good low-frequency bandwidth to measure waves with a good signal-to-noise (SNR) [1]. However, the widely used conventional geophones only have a better sensitivity above a few Hz since the openloop resonant frequency is restricted by the mechanical system [2]. In addition, there are problems of massive weight, expense and insufficiency for the conventional exploration instruments because of the separated system structures of sense and data acquisition equipment [3]. According to these shortages in response limitation and hardware cost, it is with great insights to demonstrate a digital geophone with the good low-frequency response for the effective and economical exploration equipment. In this paper, we designed a 4th -order sigma-delta modulator (M) for a conventional low cost geophone. The force balance accelerometer (FBA) principle is carried out to a conventional geophone for bandwidth extension with the single electromagnetic coil served as both sensor and actuator [4]. The over sampling technique is applied to shape out the quantization noise and meanwhile sample the analog voltage [5]. Principle of the single-coil force balance geophone is first reviewed in Sect. 2. Section 3 discusses the Simulink modeling, performance analysis and simulated results. Section 4 puts forward the hardware implementation and experimental results. Section 5 draws the conclusions. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 3–9, 2021. https://doi.org/10.1007/978-3-030-62746-1_1

4

X. Zhang et al.

2 Single-Coil Force Balance Geophone The diagram of a force balance geophone with its intrinsic coil is explained in Fig. 1 [4]. A conventional geophone is connected between the negative input and the output terminals of Operational Amplifier B. The control voltage expressed as V ctrl will modify the coil current as V ctrl /R1 and interact an electromagnetic force to proof mass. This force, expressed as GV ctrl /R1 , would affect the mass motion relative to geophone housing by driving a frame acceleration K dr V ctrl , where K dr = G/(R1 m) is the drive gain, and G is the coil transduction constant. In the circuit related to Operational Amplifier A, resistance R2 is deployed with the same values of R3 , and R1 is also arranged to equal to the resistance of the geophone coil. Therefore, the output voltage V out can be derived to   FL , (1) Vout = GM Y¨ − m where M =

X˙ s = 2 ¨ s + 2ζ0 ω0 · s + ω02 Y

(2)

is the Laplace form of the transfer function of a geophone. Y¨ is the ground motion which drives a relative X˙ between proof mass and magnetic field. ζ0 is the damping ratio, and ω0 is the resonant frequency. As shown in Eq. (1), the close loop transfer function can be expressed as: Vout GM . = ¨ 1 + GMHctrl Kdr Y

(3)

According to the FBA principle, Eq. (3) goes to a constant sensitivity: Vout 1 , ≈ Hctrl Kdr Y¨

(4)

when the electronic architectures results in a great system loop gain. Thus the close-loop behaviors of the force balance geophone are only decided by the feedback loop.

Design of a Force Balance Geophone Utilizing Bandwidth Extension H ctrl

R3 1K

Vctrl

B

7

1K

2 3

A

1

Vout

4

5

R2

8

8 6

5

4

Vcoil Geophone Rcoil

R1=Rcoil

GND

Fig. 1. Diagram of a single-coil velocity feedback geophone

Fig. 2. Simulink model of the force balance digital geophone based on the M architecture

Table 1. Parameters of the force balance geophone Parameter

Value

Parameter

Value

Geophone model

SM-6 from ION Inc.

Mechanical sensitivity: G

28.8 V/(m/s)

Coil resistance: Rcoil

375 

Frequency corner of H 2

2.7e3 Hz

Resonance: 0

4.5 Hz

Damping constant of H 2

0.707

Mass: m

11.1 g

Quantization gain K Q

105

Damping constant: 0

0.56

Feedback gain: K fb

10−4

3 System Modeling and Analysis 3.1 System Modeling As shown in Fig. 2, the force balance digital geophone is modeled with Simulink. The conventional geophone converts the input accelerator into the relative velocity and served as a 2nd -order band pass filter. The output voltage of the geophone is picked off by Operational Amplifier A in Fig. 1. Another purely electronic 2nd -order low pass filter H 2 is connected to the pickoff circuit with a distributed-feedback (DF) topology [6].

6

X. Zhang et al.

K 1 and K 2 are the feed-forward gains of integrator 1 and 2. The 1bit quantizer has a sampling rate much higher than twice of the bandwidth of the input signal and delivers the over sampled digital bitstream D. The controller filters the pulse width modulated (PWM) voltage from a 1bit DAC for the control voltage to the Operational Amplifier B. For analysis of the transform properties, the quantizer is considered as a gain of K Q added by a white quantization noise N Q [7, 8]. Using superposition principle and assuming the input signal sufficiently busy, the digital output can be expressed [9] as D = STF(Y¨ +B)+QNTF ·NQ +ENTF ·NE , where K pa and K fb are the gains of pick-off amplifier and the DAC, respectively. B is the Brownian noise, N E is the electronic noise [10], and N Q is the quantization error. For this digital geophone, the transfer functions of the 4th -order M geophone, quantization error, and electrical noise, respectively, can be expressed as follows: STF4 =

GMKpa H2 D , = ¨ 1 + GMKpa H2 Kfb Hctrl Kdv Y

D 1 =⎛ ⎞, K K GMK NQ pa 1 2 KQ Kfb Hctrl Kdv 1+ ⎜ ⎟ s2 ⎝ ⎠ K1 K2 KQ K2 KQ + + s2 s D H2 ENTF4 = = . NE 1 + GMKpa H2 Kfb Hctrl Kdv

QNTF4 =

(5) (6)

(7)

Table 1 shows the parameters of a conventional geophone model SM-6 from ION inc. and the readout interface of our digital geophone. The bode plots of Eqs. (6), (7) and (8) are predicted in Fig. 3(a). At the mechanical resonance 4.5 Hz of SM-6 geophone, it can be observed that an inflection occurs in QNTF √ 4 , QNTF 2 and ENTF 4 share the same notches, respectively. Assuming a 100 nV/ Hz electronic noise and a 1 micro-g input (60 Hz), Fig. 3(b) shows the simulated power spectral density (PSD) of the output, and the predicted noises form mechanical and electrical systems. The noise floor of 2nd order geophone is –80 dB and quantization noise dominates other noises. Since the integration of mechanical elements, it only gains a noise shaping of the first order. With regard to the same PSD of 4nd -order M, √ the noise level decreases 50 dB and reaches to about –130 dB (equivalent to 17 ng/ Hz). It indicates that Brownian motion is the major noise in-band, and the M architecture we presenting has a quantization error shaping performance of order 3.

Design of a Force Balance Geophone Utilizing Bandwidth Extension

7

Fig. 3. (a): Predicted bode plots of the noise transfer functions ENTF 4 and QNTF 4 of 4th -order geophone, the reduced QNTF 2 of 2nd -order geophone is also predicted for comparison; (b): PSD of the output bitstream with a 1 mg, 60 Hz acceleration input signal; predicted electronic and Brownian noises observed in D

3.2 System Analysis

Magnitude(dB)

20 0 121 Hz

-20

0.166 Hz

-40

Gain Margin= 29 dB

-60 -2

Phase(degree)

200

0

10

2

10 10 Frequency(Hz) Phase Margin= -92.4°

100

4

10

0 -100

Phase Margin= 88.4°

-200 -300

-2

0

10

10 Frequency(Hz)

2

10

4

10

Fig. 4. Stability analysis of the gain and phase margins of the feedback loop

In practical, to isolate the long period seismic fluctuation, and to reduce the high frequencies noise, we deployed the PID controller in the band limited form: 1 + Kd s. (8) s With expressions of Eqs. (2) and (8), Eq. (5) would define the close-loop geophone as band-pass system with a bandwidth witch is given by Eq. (9). Hctrl = Kp + Ki

Bw =

2ζ0 ω0 + K  Kp 1 + K  Kd

(9)

According to Eq. (4), the sensitivity of the force balance geophone becomes to STFsensitivity =

GKpa H2 D . = 2ζ0 ω0 + K  Kp Y¨

(10)

8

X. Zhang et al.

According to parameters in Table 1, the stability analysis of the gain and phase margins of the feedback loop are shown in Fig. 4. The feedback loop obtains phase margins of –92.4° and 88.4° at ether crossover frequency 0.166 and 121 Hz, which satisfies the stable requirement.

4 Prototype Implementation and Test Results As shown in Fig. 5(a), the hardware of M interface of the force balance geophone was implemented on analog and digital printed circuit boards (PCBs). The analog PCB detects the analog coil voltage of the geophone and gets the 1-bit digital signal to form a PWM voltage by operating the switches (ADI. ADG812). An analog PID controller shapes the PWM wave to drive the balanced force. The digital PCB accounts for a 16-bit ADC (ADI Inc. AD7606) that samples the coil voltage and an FPGA operates a discrete time filtering of H 2 .

Fig. 5. (a): Hardware of the force balance geophone with a SM-6 geophone connected; (b): Bode plots of force balance geophone and conventional geophone

The measurements and predictions of the bode plots of the force balance geophone and conventional geophone are illustrated in Fig. 5(b). The in-band sensitivity illustrated by Eq. (10) is also shown in this figure. It can be observed that the lower corner frequency is extended to 0.16 Hz by the M architecture, which proves the efficiency of our force balance method.

5 Conclusion In this manuscript, we designed a force balance geophone utilizing the bandwidth extension and data acquisition interface which is made up by a PID controlled feedback loop in the M architectures. The simulated noise floor of this close-loop geophone is about √ 17 ng/ Hz. And testing results show that this close-loop feedback and digital readout technique could extend the low-frequency response to 1/20 of the resonance of the cascaded conventional geophone. Analysis of the instrument noise model and experimental evaluations call for further studies in future work.

Design of a Force Balance Geophone Utilizing Bandwidth Extension

9

References 1. Mougenot, D.: Pushing toward the low frequencies. World Oil, pp. 25–28, September 2005 2. Laine, J., Mougenot, D.: Benefits of MEMS based seismic accelerometers for oil exploration. In: 2007 International Solid-State Sensors, Actuators and Microsystems Conference (TRANSDUCERS 2007), Lyon, France, June 2007, pp. 1473–1477 (2007) 3. Savazzi, S., Spagnolini, U., Goratti, L., Molteni, D., Latva-aho, M., Nicoli, M.: Ultra-wide band sensor networks in oil and gas explorations. IEEE Commun. Mag. 51(4), 150–160 (2013) 4. Vanzandt, T.R., Manion, S.T.: Single-coil force balance velocity geophone. U.S. Patent 6 075 754, 13 June 2000 5. Lemkin, M.A., Ortiz, M.A., Wongkomet, N., Boser, B.E., Smith, J.H.: A 3 axis surface micromachined sigma delta accelerometer. In: IEEE Solid-State Circuits Conference, San Francisco, USA, pp. 202–203 (1997) 6. Dong, Y., Kraft, M., Redman-White, W.: Higher order noise-shaping filters for highperformance micromachined accelerometers. IEEE Trans. Instrum. Meas. 56(5), 1666–1674 (2007) 7. Chen, F., Yuan, W., Chang, H., Yuan, G., Xie, J., Kraft, M.: Design and implementation of an optimized double closed-loop control system for MEMS vibratory gyroscope. IEEE Sens. J. 14(1), 184–196 (2014) 8. Chen, F., Li, X., Kraft, M.: Electromechanical sigma-delta modulators (M) force feedback interfaces for capacitive MEMS inertial sensors: a review. IEEE Sens. J. 16(17), 6476–6495 (2016) 9. Almutairi, B., Alshehri, A., Kraft, M.: Design and implementation of a MASH2-0 electromechanical sigma-delta modulator for capacitive MEMS sensors using dual quantization method. J. Microelectromech. Syst. 24(5), 1251–1263 (2015) 10. Barzilai, A., VanZandt, T., Kenny, T.: Technique for measurement of the noise of a sensor in the presence of large background signals. Rev. Sci. Instrum. 69(7), 2767–2772 (1998)

Application of 3ds Max Technology in Archaeology Qiwang Zhao1(B) and Shaochi Pan2 1 School of History and Culture, Sichuan University, Chengdu, Sichuan, China

[email protected] 2 Chengdu Institute of Cultural Relics and Archaeology Research, Chengdu, Sichuan, China

Abstract. Combined with relevant examples, this paper explores the application of 3ds Max technology in archaeology from perspectives of topography of the site (environment), excavation unit, stratum overlying and artifact restoration in detail. The purpose of this paper is to present the sites and relics intuitively, which is of great significance to promote the development of public archaeology and the exhibition of archaeological museums. Keywords: 3ds Max · Three-dimensional modeling · Public archaeology

1 Introduction In recent years, it becomes increasingly common to apply new technologies, such as GIS and 3D laser scanning techniques, in archaeology. The combination of these new technologies with archaeology will undoubtedly promote the development of archaeology to a large extent. In this study, we applied the technology of 3ds Max to archaeology, aiming to explore the application of 3ds Max technology in archaeology. The combination of this technique and archaeology will contribute to the development of public archaeology and the research of many archaeological problems.

2 Introduction to 3ds Max The full name of 3ds Max is 3D Studio MAX. It is a three-dimensional animation production and rendering software developed by the Autodesk Company. From the end of the last century to now, after more than 20 years of development, the technology of 3ds Max software has become quite mature. The version of software used in this paper is 3ds Max 2012. In this version, the software has inserted a very advanced graphite modeling tool, which can easily realize 3D modeling of complex geometry. It is of great significance in the process of archaeological relics restoration. At present, 3ds Max has been applied in many fields at home and abroad, and its achievements have attracted people’s attention. It mainly includes eight aspects: “architectural visualization, film and television special effects, game design and development, © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 10–16, 2021. https://doi.org/10.1007/978-3-030-62746-1_2

Application of 3ds Max Technology in Archaeology

11

film title and column packaging, film and television advertising, card cartoon, industrial design visualization, and multimedia content creation.” [1]. From the above eight aspects, we can see that in the main application fields of 3ds Max technology, architectural visualization, industrial design visualization and multimedia content creation have great reference significance for us to explore the specific application of this technology in archaeology. This time, we introduced the technology of 3ds Max into archaeology. The main reason is that 3 ds Max technology can realize virtual reality. “Virtual reality is a higher level of multimedia technology development; it is the integration and penetration of these technologies at a high level. It gives users more realistic experience. Because of various reasons, it is not convenient for people to directly observe the movement and change of things. This technique provides great convenience for people to explore the macro and micro world.” [2]. Through the above introduction, we can draw a conclusion that the combination of 3ds Max technology and archaeology is very promising, and that exploring the specific aspects of its application is also a very meaningful process. Now, by citing some examples, we will combine the technology of 3ds Max with archaeology, and make some positive explorations. I am glad that other scholars can criticize and correct the shortcomings of this paper.

3 The Specific Application in Archaeology In this paper, we will briefly introduce the application of 3ds Max technology in archaeology from four aspects: the topography of the site (the large environment), the excavation unit (stratum), stratum overlying and the restoration of artifacts. 3.1 Topography of the Site With the powerful function of terrain making in the 3ds Max software, we can realize the three-dimensional representation of the specific environment of the site. Through the three-dimensional modeling of the topography of the site, we can see the environment of the site very intuitively. The specific methods are as follows. Firstly, we need to obtain the contour map of the site, and calculate the actual size of the scene through the scale of the map. Secondly, we can make a plane equal to its actual size in the 3ds Max software, and paste the contour map on the plane for display. Thirdly, through the line command in 3ds Max software, we need to copy each contour line in the contour map, and pulls the height of each contour line to the actual height marked in the map. Fourthly, selecting all contour lines, the three-dimensional planning can be realized through the terrain command under the compound object of the software. In the three-dimensional view, we use different colors to represent different features and mark them, and mark the specific location of the site in the three-dimensional map, so that we can clearly see the general environment of the site, as shown in Fig. 1. We believe that the cost of this process is much lower than that of aerial photography. Therefore, it has advantages. As for its significance, now we think that it is mainly used as a display language. Through the presentation of the three-dimensional terrain of the

12

Q. Zhao

Fig. 1. Location of the site

site, we can see the environment of the site clearly, which is conducive to the display of archaeology in the museum and can promote the development of public archaeology. Excavation Unit (Stratum) The main application of 3ds Max technology in excavation unit is the threedimensional modeling of strata. There have been some researches on the method of stratum modeling. “There are three main types of stratum modeling methods: facial model, volumetric model and mixed model.” [3]. We mainly use the method of facial model in stratum modeling. First of all, we need to explain the facial model. “A facial model establishes the three-dimensional model of a solid by describing the geometric shapes of the outer surface of the spatial object. Its advantages include small data storage, fast modeling speed, and convenient data display and update. The disadvantage is that it is difficult to obtain the internal attributes of spatial entities, and it is not easy to conduct spatial analysis.” [4]. Because our research focuses on the open exhibition of field archaeology, we use this method in modeling. Our exploration in this part of the application focuses on stratum restoration based on data left on the profile of the square diaphragm. In addition, this method is still of certain significance in some aspects of archaeological analysis. “From the three-dimensional view of the cross-section, we can find the macroscopic spatial characteristics of the archaeological strata in a certain area. It also clearly reflects the thickness change and rules of strata overlying, as well as the breaking phenomenon on the ground level.” [4]. According to data obtained in field archaeology, 3D solid modeling has different methods to realize. Some of them have been studied by predecessors. “3D solid modeling is carried out according to archaeological data, and various modifiers and tools are widely used in the modeling process. For example, the river is made by squeezing and bending, and then the river is formed on the ground model by Boolean method. A combination method is used to combine several objects into one object, such as a complex house. In order to enhance the authenticity of the model and reduce the size of generated file, some details can be directly imitated with pictures without modeling, that is, using mapping

Application of 3ds Max Technology in Archaeology

13

and texture mapping technology.” [5]. This time, we used two different methods to model the stratum. First, we adopt a traditional method to carry out 3D modeling. Firstly, we import stratum section data obtained from the field into AutoCAD software to draw the corresponding plane map, and then import the plane map into the 3ds Max software for 3D modeling. The four walls of each excavation unit are respectively drawn and modeled, and finally the four walls are connected in sequence. Under the condition of real and effective data, the four walls of each excavation unit can realize seamless docking, as shown in Fig. 2. The advantage of this modeling method is that modeling data is very close to real data. It reduces the error to the greatest extent, and the results obtained are more effective, which greatly increases the credibility of using this model in later analysis. However, its disadvantages cannot be ignored. To adopt this method needs two programs, and the amount of data used in AutoCAD software is large. The workload is greatly increased, so the actual operation is difficult and the efficiency is relatively low. Therefore, this method is suitable for the excavation unit of small-scale sites [6]. In the early stage of exploration, we used this method. The effect was very good, but the progress was too slow. Therefore, this method is not suitable for the 3D modeling of strata of large-scale sites.

Fig. 2. Chart of the excavation unit obtained from the stratum plane made by CAD

Second, we adopted a method similar to the three-dimensional modeling method in paper, Using 3D Virtual Modeling Technology to Reproduce the Cultural Scene of Archaeological Sites. It “directly uses pictures to imitate, that is, using mapping and texture mapping technology”. The specific method is as follows. When we excavate, the specification square of the excavation unit is 5 × 5 m2 . Excluding 1 m left in the east and north sides of the diaphragm, the actual excavation area of each unit is 4 × 4 m2 . We first import the photos of each excavation unit into photoshops software to intercept the stratum section. Since the length of each square wall is fixed, we can calculate the actual height of the side walls shown in the photos according to the length width ratio of the screenshot [7]. Then, a plane of the same size is created in the software of 3ds Max, and the intercepted figure is pasted on the created plane with the bitmap command by using the material editor provided by the software; stratum lines are copied according to the figure. In order to ensure that the stratum lines copied are more accurate, we enlarge the view of 3ds Max appropriately, so that we can see more details and get more accurate lines. Finally, the 3D modeling is realized through extruding these lines, as shown in Fig. 3.

14

Q. Zhao

Fig. 3. Chart of the excavation unit obtained through copying stratum lines

The advantage of this method is that the amount of data required is relatively small. Although it still has two operation procedures, it has high mapping efficiency and faster speed compared with the first method; it is suitable for the exploration of large-scale excavation units [8]. Its disadvantage is that, photos obtained by camera are influenced by perspectives and other factors; the accuracy is slightly lower. Data in the later analysis is less reliable than the former. After the three-dimensional modeling of strata, we can directly display the two-dimensional or three-dimensional maps of these excavation units in the museum, or we can conduct some later analyses. For example, 3ds Max software has a layer manager. We can use it to classify each layer of the excavation unit. We can freely display or hide any layer in the software. Through this kind of processing, we can clearly see the distribution of each cultural layer in each location of the site, and use these data to make macro analysis on related problems of the stratum. 3.2 Stratum Overlying Stratum overlying is a theory formed based on the need of showing to the public, which is of great significance in the exhibition of archaeological museums. The specific method is as follows. We build models on main cultural accumulation layers of the site in 3ds Max software, which can be combined with specific data of the site, or not combined with specific data. According to the time of each cultural accumulation layer, layers overlie each other from top to bottom. Finally the result is output in the form of video with simple dubbing introduction. Through this video, we can help the public to understand the general situation of the site, and achieve a demonstration purpose. In the development of public archaeology, it is of great significance to explore the theory of stratum overlying. We can assume that from top to bottom, the main cultural accumulation of a site includes, the topsoil layer, the Ming and Qing cultural accumulation, the Tang and Song cultural accumulation, the Northern and Southern Dynasties cultural accumulation, the Eastern Han cultural accumulation, the Eastern Zhou cultural accumulation, the Western Zhou cultural accumulation, and the Neolithic Age cultural accumulation. Neolithic cultural accumulation is the earliest layer in this site. First we put the raw soil layer at the very bottom, and then we superimpose them in the order; main relics contained in the cultural deposits of various periods are also displayed, as shown in Fig. 4. It should be pointed out that this experiment did not combine with specific data of the site. It only presents the general formation process of a site, in order to visually present the main overview of the site.

Application of 3ds Max Technology in Archaeology

15

Fig. 4. Illustration of tomb complex of Eastern Zhou Dynasty

3.3 Restoration of Artifacts The technology of 3ds Max is of great significance in the restoration of archaeological artifacts. In field excavation, we can find many incomplete artifacts. In order to better study cultural factors reflected in the site, we need to restore these damaged artifacts. Previous experience tells us that some potteries and other artifacts excavated in the field have relatively regular shapes, so they can be easily restored in the 3ds MAX software, as shown in Fig. 5.

Fig. 5. Restoration of artifacts

For the restoration of irregular objects, the advanced graphite modeling tool in 3ds Max software can easily realize the modeling of irregular geometry shapes and the restoration of objects with irregular shapes. What’s more, the result generated is not only convenient for the storage of electronic data, but also convenient for scholars to extract in the future [9]. In addition, scholars at home and abroad have done a lot of research on the restoration of tombs, especially the restoration of large-scale tombs. The significance of restoring tombs is that it provides convenience for further research on their shapes. Since many achievements have been made in this respect, we will not further explore the issue here.

4 Conclusion The application of 3ds Max technology in archaeology has considerable prospects. We believe that 3ds Max technology will play an important role in future exhibition of

16

Q. Zhao

archaeological museums and promote the development of public archaeology. In view of the limitations of knowledge, we only explored the application of this technique in four aspects. As for the application of 3ds Max technology in other aspects of archaeology, we will continue to explore in the future. It is also hoped that other scholars can participate in the discussion, so that the 3ds Max technology can make more contributions to the development of archaeology.

References 1. Mars Age: 3ds Max 2011 Platinum Handbook I, pp. 3–7. People’s Posts and Telecommunications Press, Beijing (2011) 2. Ye, X.S.: Three dimensional representation of archaeological sites. Wenbo 5, 70–74 (2002) 3. Kan, Y.K., et al.: Three dimensional reconstruction of archaeological strata. Comput. Appl. Res. 24(3), 302–305 (2007) 4. Zhu, L.D., et al.: Research on 3D visualization and application of archaeological strata: taking Jinsha site in Chengdu as an example. J. Chengdu Univ. Technol. (Nat. Sci. Ed.) 5, 564–568 (2007) 5. Liu, Y.L., et al.: Reappearance of cultural scenes of archaeological sites using 3D virtual modeling technology. Wenbo 1, 87–90 (2009) 6. Liu, J., Geng, G.H.: 3D realistic modeling and virtual display technology of cultural sites. Comput. Eng. 36(020), 286–290 (2010) 7. Lin, B.X., Zhou, L.C., Sheng, Y.H., et al.: 3D modeling method of archaeological sites based on hand drawn maps. J. Earth Inf. Sci. 016(003), 349–357 (2014) 8. Zhang, J.: Research and Application of 3D Reconstruction Technology of Site Scene Based on Laser Scanning Data, Northwestern University (2012) 9. Li, W.Y., Zhang, F.S., Yang, J.: Application of 3D scanning and rapid prototyping in cultural relic restoration. Wenbo 6, 78–81 (2012)

The Application of Virtual Reality Technology in ESP Teaching Xuehong Yuan(&) Air Force Aviation University, Changchun, Jilin, China [email protected]

Abstract. Discuss how virtual reality (VR) technology can improve the learning efficiency of Chinese students’ ESP (English for special purpose), especially if it is applied to early childhood education. VR mainly revolves around scenes, interactivity, fun, and immersive experiences. The research on the theory of information processing and learning proves that the information delivered to students by ESP teaching using virtual reality technology is more acceptable than the information delivered to students by ordinary ESP teaching. Accordingly, this article analyzes and studies the application of VR technology in ESP teaching. Keywords: Virtual

 Virtual reality  Virtual technology  ESP teaching

1 Introduction English for Specific Purposes, also known as ESP, refers to English categories related to certain fixed industries or subjects. It is an important component of English language teaching and an outstanding branch of applied linguistics. It involves a very wide range, not only involving linguistic knowledge, pedagogy knowledge, but also involving professional knowledge [1]. In traditional English teaching, teachers always explain English as pure knowledge, spending a lot of time and resource in the classroom, allowing students to mechanically train and learn by rote. The application of VR technology has brought a series of changes to secondary vocational English teaching. It can stimulate students’ various senses, activate the classroom atmosphere, attract students’ attention, expand students’ thinking space, and stimulate students’ learning interest. It is great importance for improving classroom teaching. Therefore, teachers should realize the effective integration of VR technology and courses, so that multimedia can assist English classrooms more effectively [1].

2 VR Technology Overview 2.1

Definition of VR Technology

VR technology is an extremely important research branch of simulation. At present, one challenging frontier subject and research field is to combine simulation technology with computer graphics interface technology, multimedia technology, sensor technology and © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 17–23, 2021. https://doi.org/10.1007/978-3-030-62746-1_3

18

X. Yuan

network technology, so as to achieve similar effects to the real world. The environment is a real-time 3D realistic image generated by a computer, while the VR technology uses these generated images to simulate nature, environment, and perception skills. Among them, the VR technology should also include the real human perception and way of thinking [1]. This not only refers to the usage of computer graphics technology to produce corresponding vision, but also requires the production of movement, touch, hearing and other perceptions, even including taste and smell, which we call multiperceptual phenomena. With perception, we naturally think of making certain responses to the sensed signals that is, producing corresponding actions, which is called natural skills. The so-called natural skills refer to the movement of human body parts or other human actions. This requires the computer to record data and predict the possible physical movements of the participant in the next step, and transmit the data and other information to the user in real time [2]. 2.2

Characteristics of VR

The quasi-reality technology integrates a variety of scientific technologies, such as simulation technology, graphics technology, sensor technology, display technology, etc. The application of these technologies realizes the creation of a virtual information environment in a multi-dimensional information space, so that users have an immersive experience, and the environment has perfect interaction and helps to stimulate ideas [2]. Mainly have the following characteristics, as shown in Fig. 1:

Multisensory Presence    

Virtual Reality

Interactivity    Autonomy   

Fig. 1. Characteristics of VR

1) Multi-sensitivity. Refers to the interaction of multiple sensors with the virtual environment of multi-dimensional information. In addition to the computer visual perception, there are tactile perception, auditory perception, motion perception, and even smell, taste, perception, etc. [3]. The ideal VR should have all the perception functions of the human body. It is these characteristics that make VR technology

The Application of Virtual Reality Technology in ESP Teaching

19

present in front of people in an intelligent form and enjoy a certain degree of security in exploring new knowledge. 2) Sense of presence. It refers to the counter-touch of the human body through a variety of sensors, making participants feel immersive in the virtual environment and feel the real existence in the simulated environment. The ideal simulation environment should make it difficult for users to distinguish true from false [3]. In the virtual world, users can get a different experience from reality, and perfectly integrate cognition and perception. 3) Interactivity. It means that while participants control and feel things in the virtual environment through a variety of sensors, the virtual environment uses sensors to counteract the participants, and each and every information exchange is mutual. Interactivity reflects the difference between VR and traditional 3D animation and models generated by traditional CAD systems. The construction of VR is not only to provide visual enjoyment similar to 3D movies, but also to construct dynamic, transformable and interactive effects. An obvious advantage of the VR system lies in its interactivity [4]. In this system, users can negotiate with objects in the virtual environment through interactive devices, and can effectively control the triggering of certain actions according to their personal thinking. It can also provide users with suggestions in time according to their needs. It reflects the user’s degree of objects manipulation in virtual environment. The natural degree of feedback and the method of rearranging the virtual environment of the system [5]. 4) Autonomy. Means that the virtual environment is designed and constructed by participants according to their own needs. It is in a dominant position in the operation of VR. It is designed and produced according to the physical objects in the real world and the laws of physical motion [4]. In VR, various the operation of things must conform to the objective laws of reality.

3 The Advantages of VR Technology in ESP Teaching In the whole learning process of students, it is not a simple information input, storage, and extraction, but a process of interaction between old and new experiences, which involves creating scenarios, establishing hypotheses, collecting information, exploring hard, verifying hypotheses, and earnestly. Thinking and a series of links. Everyone can experience and feel for themselves, which is actually more convincing than empty and abstract preaching. There is a difference in nature between active interaction and passive indoctrination [5]. VR uses modern electronic information technology to establish various virtual laboratories, and has advantages that traditional laboratories cannot match: 3.1

Cost Saving

When talking about VR systems, people first think of expensive electronic equipment and high development costs, thinking that the cost is too high. However, considering the sharing of hardware and software, the saved costs of housing and construction, as

20

X. Yuan

well as the repeated use and saved material costs, the unit cost of the test is relatively low [6]. Due to hardware constraints such as equipment, venues, and funding, many experiments cannot be carried out. Using the VR system allows students to do various experiments without leaving home. 3.2

Avoid Risks

Many students are exposed to the experiments they have learned for the first time. There are often various dangers in real experiments or operations. If the operation is a little careless, they may agree with very serious consequences, and this pressure often makes It is difficult for students to receive the due ESP ESP teaching effect due to stress or failure [7]. Using VR technology to conduct virtual experiments not only allows students to observe the whole process of the experiment clearly and vividly, but also to experience the feelings of on-site operation. Students can safely do various dangerous experiments in the virtual experiment environment. Repeat the test until the goal of ESP ESP teaching is achieved [6]. 3.3

Expanding Space

With the technology development, the natural science knowledge that students need to master is more extensive and subtle. Under realistic conditions, some experiments are difficult to achieve. However, the use of VR technology can break the limitations of space and time. Without leaving the classroom and in a virtual laboratory, students can go to the sky and the sea, feel the vastness of the universe and the depth of the seabed, and enter these objects to observe the movement of particles., And even observe the chemical reaction process [8].

4 The Application of VR Technology in ESP Teaching 4.1

Application of Information Processing

Learning is a gradual process. Generally, it is divided into several stages and iteratively to truly understand a piece of knowledge. The process is tortuous, and the accumulation of quantitative changes will cause a qualitative leap. At these stages, it is necessary to process the knowledge learned. In these processes, new things are often produced [9]. The so-called review of the past to learn the new, and this phenomenon can be collectively referred to as learning. Learning refers to the process of processing inside the human brain, and it is an important part of learning information processing theory. Therefore, in the process of teaching, we must take into account the ability of each student to study and process, and try to cultivate and improve the ability of students in this area. Therefore, the teacher’s teaching phase and the student’s learning phase are complementary. The teaching process must be carried out in accordance with the basic principles and basic strategies of learning [8]. After determining the learning outcomes, they must be arranged in an appropriate order according to the teacher’s teaching goals.

The Application of Virtual Reality Technology in ESP Teaching

4.2

21

The VR Technology Application in the Improvement of ESP Learning

Learning motivation is a dynamic mechanism of learning activities, which determines whether the learning activities can be realized smoothly, that will directly affect the learning effect of students. Ordinary ESP teaching, students only get audio-visual ESP stimulation from books and teachers. This kind of stimulation is monotonous and boring for students. Students can only connect with this kind of stimulation through basic cognition of previous things. Obviously, this connection is weak and indirect [9]. The use of VR technology can greatly improve the connection between this stimulus and cognition. Due to its immersion, VR technology can allow students to be fully immersed in an environment full of ESP atmosphere, and its interactivity can be Provide students with more sources of stimulation, so that students can not only get stimulation from books and teachers, because of its conception, students can not only be exposed to the stimulation of known things, but also can get stimulation from unknown things [10]. In addition, the VR technology application in ESP teaching is becoming more and more widespread. It is estimated that the market will reach 40 million US dollars in 2020, and the compound annual growth rate will remain double digits, as shown in Fig. 2.

Fig. 2. The application status of VR in ESP teaching

4.3

Store and Manage the Daily Behavior Data of College Students

4.4

VR Technology Realizes Operating Conditional Learning Theory

The main thing is to figure out what is a “trigger reaction” and what is a “spontaneous reaction”, and these two reactions correspond to two behaviors: reaction behavior and operation behavior. Generally speaking, reaction behavior is more passive and controlled by stimuli; operational behavior means that the body can actively adapt to the

22

X. Yuan

environment and is controlled by behavioral results. Therefore, two learning forms have emerged: one is used to shape the reaction behavior of the organism, which is called classical conditioning; the other is used to shape the operation behavior of the organism, which we call operational conditions [10]. 4.5

The Enhanced Stimulation of Operational Conditioning by VR Technology

A very important principle is mentioned in the behavioral learning theory. The resultfollowing behavior is more effective than the result delay. Instant feedback plays an important role in VR technology: first, it more intuitively reflects the connection between behavior and results, and second, it makes the feedback information more valuable. The interactive nature of VR makes it easy to achieve instant feedback [11]. Similarly, in traditional classroom teaching, the teacher preached and solved the puzzles by karma, while the students listened in a muddled manner. Students are passive listeners and basically have no chance to respond in general, and they often respond in a positive way. Traditional textbooks cannot avoid being boring, and even make students feel disgusted, which hinders the learning of the important knowledge points covered in the book [11].

5 Conclusion In summary, due to the immersion, interactivity, and visualization of VR technology, comparing students with ordinary ESP learning can effectively stimulate students’ interest in learning and thus improve their enthusiasm for learning, and can achieve effective feedback and timely feedback. Give students appropriate positive reinforcement and negative reinforcement (positive reinforcement), which can ultimately greatly improve students’ ESP learning ability.

References 1. Cui, L.: Overview of virtual reality technology and its applications. Fujian Comput. 11(25), 11–14 (2018). (in Chinese) 2. Liu, W.: Analysis of the application of virtual technology in English teaching. Road Success 8(34), 59–60 (2019). (in Chinese) 3. Cong, R.: The design strategy of “virtual technology” in junior high school English classroom teaching. Curric. Educ. Res. 12(14), 129–130 (2019). (in Chinese) 4. Tang, C.: Design and application of junior middle school English “micro course”. English Teach. 18(16), 97–99 (2018). (in Chinese) 5. Weng, J.: Analyze the application of micro-classes in English grammar teaching. English Teach. 9(19), 91–92 (2015). (in Chinese) 6. Hu, T.: The new trend of the development of regional education information resources in virtual reality technology. Audio-Visual Educ. Res. 13(10), 61–65 (2017). (in Chinese) 7. Lei, Y.: The role and application of virtual reality technology in high school English classroom teaching. Master Online 22(6), 91–92 (2019). (in Chinese)

The Application of Virtual Reality Technology in ESP Teaching

23

8. Xia, M.: Research on the design and application of virtual reality technology in high school English grammar teaching. Sci. Consultation Educ. Res. 8(12), 137–139 (2018). (in Chinese) 9. Li, Q.: Research on the application of virtual reality technology in high school English grammar teaching. English Teach. 11(12), 110–116 (2018). (in Chinese) 10. Wang, F.: Research on high school English teaching practice based on virtual technology. Overseas English 5(12), 20–21 (2018). (in Chinese) 11. Li, L.: Virtual reality technology short video teaching high school English grammar and language points flexibility and timeliness exploration. Mod. Commun. 33(2), 192–193 (2018). (in Chinese)

Application of Simulation Method Based on Computer Bionic Design Bin Wang(B) School of Digital Arts and Design, Dalian Neusoft University of Information, Dalian, China [email protected]

Abstract. With the development of science and technology and the advancement of computer technology, computer bionic design has become a new direction for exploring concepts and form of design. Through the integration of computer algorithms and impact factors, design innovation based on the shape of biomorph has become one of the emerging design directions. With the development and change of design concepts, many new design methods and theories have emerged. The simulation method is one of the most significant design methods. This article explains the influence and application of the simulation method on design form in modern design through the application of the simulation method in different design fields under computer bionic design. Keywords: Computer bionic design · Modern design · Simulation method · Architecture design · Product design

1 Introduction Computer has become an essential tool in the field of modern design. Due to the increase in the performance and speed of computer, the efficiency of design can be greatly improved to fulfill the requirements that manpower cannot meet. In terms of bionic design, as an interdisciplinary subject, it relies on the results obtained by bionics, sets the algorithm through computer technology, and incorporates multifaceted influence factors for simulation calculations to form design results with bionic properties. This paper explains the application of simulation method in design practice from the perspective of computer bionic design to apply and explore the bionic design more intelligently [1].

2 Computer Bionic Design 2.1 Basics of Bionic Design When it comes to computer bionic design, we must first understand two concepts: bionics and bionic design. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 24–29, 2021. https://doi.org/10.1007/978-3-030-62746-1_4

Application of Simulation Method Based on Computer Bionic Design

25

Bionics refers to a method of studying various characteristics of the biological world as objects of imitation for improving or innovating modern science and technology. Although science and technology have developed to a very high level, there are a large number of biological phenomena in nature, which are incomparable with the existing technology of human beings. Observation and analysis of biological characteristics can effectively promote the development and progress of human society. Bionic design refers to a design activity that simulates the characteristics of biological information and laws in nature and is also a design activity carried out by imitating or receiving inspiration from living things. As an interdisciplinary combination of bionics and artistic design, bionic design is a new direction for the development of human science in the early 21st century. 2.2 Principles of Computer Bionic Design Computer bionic design is one of the forms using simulation method. In computer bionic design, algorithmic formulas and software is used to combine specific design environments or influence factors of design requirements, and establishes a bionic system and structural model through differentiated repetitive calculations and morphological evolution. Computer bionic design is non-repetitive. Even with the same environment and impact factors, because of the difference of time and design concepts, despite the repeated iterations of the algorithm, the final design model will be significantly different. Computer bionic design involves two important phases: model construction and model analysis. The scientificity, accuracy, completeness, and systematicness of the model construction have a fundamental role in the later model analysis and problem optimization. Model analysis refers to testing and perfecting the constructed model from various aspects such as morphology, structure, function, and environment. At the same time, it looks for the optimal design solution by observing changes in the model. 2.3 Principles of Computer Bionics The integration and analysis of bionic models through computer is the basis of simulation design. By building models, many problems that were solved using complex, micro, unreasonable but conventional methods can be settled. During the model building phase, it should be observed from a dynamic perspective, including multiple factors such as structure, function, and form. The model can be a mathematical model, a physical model, a dynamic model, a discrete model, etc. Functional principle: Different biological forms contain different characteristics, and different samples determine different characteristics of the model structure. Therefore, at the beginning of sample selection and model construction, functional requirements should be determined to select bionic samples in order to meet the requirements of accurately extracting functional features. The principle of simplicity: In the process of establishing the bionic model, the main characteristics of the sample should be extracted to reduce the influence of interference factors. The main factors are extracted, the secondary factors are weakened, the primary and secondary relationships are clear, and the bionic design is optimized.

26

B. Wang

The principle of simplicity: In the process of establishing the bionic model, the main characteristics of the sample should be extracted to reduce the influence of interference factors. Extract the main factors and weaken the secondary factors to optimize the bionic design. The principle of accuracy: The design of bionic models by computers is the basis for subsequent analysis, observation, and improvement. The accuracy of the model is the guarantee for the smooth progress of subsequent research. So accuracy determines whether the bionic model can succeed. The principle of identifiability. In the process of model construction, bionic samples are the main source of data, so the model constructed should have obvious sample characteristics, which is the source of identifiability. At the same time, the function, morphology, texture, and characteristics of the organism are directly related to the shape, therefore the bionic model should contain characteristics of identifiability.

3 Application of the Simulation Method in Product Design Conceptually, the simulation method in modern design refers to the reproduction of the appearance, nature, pattern, and feature of a prototype or pattern by means of an object or process, a scientific analogy method that uses the similarities and correlations of different objects in the design behavior. The image reproduced by the simulation method is created by simulating the system of diverse types and materials. Therefore, the simulation design method is an important scientific method to research and create new objects and products by correspondence theory. The prototype is created through creative thinking. 3.1 The Essence of Product Design In product design, the goal product, but the ultimate purpose is user, that is, the ultimate purpose is to meet the needs of people in manipulation and life regardless of the style of the product. The purpose of design is people, and the ultimate purpose is to meet people’s increasing material and spiritual needs. Human runs through the entire process of product design. The success of product design depends on two aspects, which are “Whether it works” and “Whether it works well”. A good product should be able to meet user’s needs to the greatest extent. On the one hand, the material needs, on the other hand, the spiritual needs. 3.2 The Simulation Method in Product Design The appearance and modeling design of a product is one of the cores of product design. Nowadays, product design not only meets user’s needs on function but also pays more attention to spiritual communication with people. The simulation method in architecture design takes the internal organization and external form of organisms as research objects to explore the scientific and reasonable construction laws contained in it, and applies the results to architecture design, in order to enrich architecture design methods and improve functions of buildings, and achieve people’s needs [2–4].

Application of Simulation Method Based on Computer Bionic Design

27

4 Application of the Simulation Method in Architecture Design 4.1 Application of the Simulation Method in Construction Outward Appearance Design of Architecture Applying the simulation method to the appearance of a building is innovative. Studying the appearance of various organisms in the natural to explore the inherent scientific rules, and to future explore the possibility of applying those rules to architecture design. This can not only integrate the functions and forms of architecture but also create innovate and varied architectural forms. The Ronchamp Chapel (Fig. 1) designed by Le Corbusier is a typical representative of the application of the simulation method in architecture design. The structure of the Ronchamp Chapel is dynamic. It looks like a bird with wings flying high in the air. Kennedy Airport (Fig. 2), designed by Eero Saarinen, is a classic modernist design, and the simulation method is also adopted when designing the appearance. John F Kennedy International Airport is like a soaring eagle with its wings spread, which exactly matches the function of the airport. In addition, the Bird’s Nest in Beijing and the National Centre for the Performing Arts of China are also an outstanding representative of the simulation method in the construction outward appearance design of architecture.

Fig. 1. La Chapelle de Ronchamp

Fig. 2. John F. Kennedy International Airport

4.2 Application of the Simulation Method in the Function Design of Architecture It is common to use the simulation method in the function design of architecture, which can combine good practicality and functionality, as well as flexible expression method. Nature is a magical treasure, which designers can draw infinite inspiration and apply to design, to create innovative space and functionality of a building. Through studying the structure of the ant nest, people found that there is a complete temperature regulation system inside the ant nest, and the temperature and humidity in the nest can be adjusted by the transformation of the anthill and the internal channel. This construction is also used in architecture design. The design of the new energy-saving building constructed in the capital of Zimbabwe is imitating the structure of an ant nest, which not only effectively adjusts the indoor temperature but also saves energy.

28

B. Wang

4.3 Application of the Simulation Method in Structure Design of Architecture Along with the society progress and development, the style of architecture design has also changed a lot. Large-span, high-strength, and distinctive shape are becoming more and more popular in architecture design. The structural the simulation method is based on organisms in nature, which is inspired by theoretical research and applied in the practice of the structure design of buildings. The eggshell is something we are all familiar with. A whole egg shell is difficult to crumb though the shell is thin. This is because its shape is curved. When it is subjected to external pressure, the force will be evenly distributed along the curved surface. It is because of the inspiration of egg shells that many innovative architectures with shell structures are designed. For example, the National Centre for the Performing Arts of China (Fig. 3) is a typical example of shell structure. The long span and sleek appearance make the architecture both beautiful and functional. The Sydney Opera House (Fig. 4) was designed and built by Jon Woo Chung. It is a typical shell structure. Its appearance is like a standing white shell facing the sea, as well as a white sail sailing in the wind. Today, Sydney Opera House is not only the temple of art and culture in Sydney, but also the soul and logo of Sydney [5–7].

Fig. 3. The National Theatre of Beijing

Fig. 4. Sydney Opera House

Application of Simulation Method Based on Computer Bionic Design

29

5 Conclusion This article interprets the biological morphology language from the perspective of computer bionics and simulation. It explains the basic methods and principles of bionic design. Bionic is a specific form of simulation, the simulation method is a significant design method through the reproduction and creation of a prototype. Every creature in nature could be the inspiration of design and expressed through simulation. Varying expressions and colorful colors are the characteristics of the simulation method which are different from other design methods. The continuous deepening of the application of simulation in design will certainly lead modern design to a more colorful world.

References 1. Liu, G., Shen, J.: Products Basic Design, pp. 124–132. China Light Industry Press, Beijing (2001). (in Chinese) 2. Yu, F., Chen, Y.: Bionic Plastic Design, pp. 211–237. Huazhong University of Science and Technology Press, Wuhan (2005). (in Chinese) 3. Gao, J., Liu, X.: Preliminary Study on Bionic Building Structures, pp. 221–234. China Architecture & Building Press, Beijing (2001). (in Chinese) 4. Yao, X., Shen, M.: Bionic Architecture Design, pp. 105–141. Shanxi Architecture, Shanxi (2006). (in Chinese) 5. Yao, X., Shen, M.: Bionic Architecture Design, pp. 104–112. Shanxi Architecture Press, Shanxi (2006). (in Chinese) 6. Cai, J., Wang, J.: Bionics Design Study, pp. 168–201. China Architecture & Building Press, Beijing (2013). (in Chinese) 7. Ma, S., Zhu, X.: Artificial Intelligence, pp. 94–113. Tsinghua University Press, Beijing (2004). (in Chinese)

The Implementation and Application of Computer Simulation Technology in PE Teaching Junhua Lu(B) Liaoning Institute of Science and Engineering Physical Education College, Jinzhou 121000, Liaoning, China [email protected]

Abstract. Implementation method of computer simulation technology in physical education as a subject to study. First of all, the paper discusses the basic concepts of computer simulation technology, the application scope and were briefly reviewed in this paper, the main process. Secondly, the obstacle factors of computer simulation technology in physical education teaching are summarized and analyzed from three perspectives. Thirdly, the application method of computer simulation technology in the field of sports science is introduced from two aspects. Finally, combining with the teaching practice of physical education, this paper comprehensively demonstrates the implementation method of computer simulation technology in the practice of physical education from three dimensions. The research results can provide positive and beneficial inspiration and help for related experts and researchers. Keywords: Computer simulation technology · Physical education · Implementation and application

1 Introduction Since the beginning of the 21st century, computer technology has developed rapidly. Computer simulation technology has played its unique advantages in early warning and prediction, evaluation and evaluation, practical experiment, system analysis, and principle design. Based on computer simulation system and the basis of the research and development of all kinds of models, not only reflects the elements in the process of modeling, associated with each system object, the internal relation between each pixel unit and the objective law, and with the maturity of the computer simulation technology and its related fields of large data process function, the interaction between the virtual reality, graphics geometry more and more to promote the development of college physical education teaching, as a result, the current research on virtual human body and its movement became one of the hot topics. With the reform of physical education and teaching in colleges and universities in our country in full swing, computer simulation © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 30–38, 2021. https://doi.org/10.1007/978-3-030-62746-1_5

The Implementation and Application of Computer Simulation Technology

31

technology is bound to get new development opportunities centering on the general principle of “total balance, component disassembly and momentum control” in the process of physical education [1]. Therefore, combined with the overall planning of the 14th five-year plan, it is not difficult to predict that the advantages and disadvantages of the application and implementation methods of computer simulation technology in physical education will directly affect the effectiveness of sports training, and even gradually improve the importance of sports teaching or competition training projects.

2 Overview of Computer Simulation Technology 2.1 Basic Concepts of Computer Simulation Technology Computer Simulation is a realistic and dynamic imitation of the structure, function and behavior of the system and the thinking process and behavior of the people participating in the control of the system by using an electronic Computer. Computer simulation technology has its own uniqueness, it is not only a very effective quantitative analysis method and tool, but also a highly intuitive descriptive tool. In simple terms, it is to describe a specific system or a complex process vividly by means of modeling. With the help of experimental working methods, its internal characteristics are described in detail and presented in the form of data, so as to provide timely and effective decision-making Suggestions for the decision-making and management levels. 2.2 Application of Computer Simulation Technology The application of computer simulation technology is more and more extensive, and it plays a positive and important role in people’s production and life planning, natural environment maintenance, military prediction and analysis, human physiological simulation and many other fields. Quantitative analysis was carried out on the set model, trial and error and draw final conclusion. 2.3 The Main Flow of Computer Simulation Technology Computer simulation technology firstly completes mathematical modeling through continuous exploration, then carries out computer simulation experiments according to the simulation field, and finally obtains conclusions through the comprehensive analysis of experimental results in three main stages to realize the entire process of computer simulation. From the perspective of process, computer simulation technology is not only an experimental analysis of a single individual or a single model, but a comprehensive review of the three stages. Generally speaking, the process steps of computer simulation technology include the following steps: 2.3.1 Introduction of the Question Through a preliminary description and analysis of the problems, to clarify the basic characteristics of the respondents, the computer and then determine the final purpose of

32

J. Lu

test, and gradually perfect all kinds of demand factors, then, according to the previous set of requirements, a reasonable plan and the subsequent restriction conditions about the design of computer simulation technology as well as the structure and size of the system itself. 2.3.2 The Establishment of Mathematical Model The existence characteristics of computer simulation technology depend on the accuracy of mathematical model establishment, which will directly affect the deviation degree and reliability of simulation results. Therefore, this step is also called the core step. 2.3.3 Quadratic Mathematical Modeling According to the computer’s own operation law, simulation mode and precision accounting, on the basis of the original first mathematical modeling, it is further transformed into a new model that can be designed according to the computer program. Through the transformation, the simulation system really has the theoretical basis of mathematical modeling, and at the same time, the purpose of secondary modeling is better realized. 2.3.4 Programme As a computer simulation technology in the process of physical education, programming is more important, in the process of the integration of the two technologies should be used in different ways, more effective methods, mathematical model programming, and continue to carry out professional debugging, finally achieve the ideal effect. 2.3.5 Promotion of Simulation Experiment According to the requirements of the regulations, the simulation system is deduced on the spot, and the experimental data are collected and sorted out. 2.3.6 Comprehensive Analysis and Model Validation The application of computer simulation technology in the field of physical education is still in its infancy, and each technology fusion needs continuous verification to find the best technical scheme. It can make the accuracy of the system model more reasonable and finally fully analyze the effectiveness of simulation technology.

3 Analysis on the Obstacle Factors of Computer Simulation Technology in Physical Education Teaching Computer simulation technology is a brand new teaching concept, college physical education teachers need a period of adaptation to the new food, to be able to popularize and develop the need for everyone to emancipate the mind, serious study. Actively overcome adverse factors. Analysis of the reasons is mainly limited to the following aspects:

The Implementation and Application of Computer Simulation Technology

33

3.1 The Practical Limits of Scientific and Technological Power Sports discipline subject classification is more, so, the teaching content is relatively complex, social institution or university itself, generally lack of perfect computer for sports discipline echelon personnel, owing to lack of emphasis, inadequate funding, caused in the field of sports skill in exclusive computer simulation software research and development ability are relatively weak, already can’t adapt to, different month demand new sports teaching reform and teaching practice. At the same time, there are relatively few technical service companies aiming at college physical education in the society [2]. Either the resources distribution is not uniform, or the technical companies are not professional enough. In addition, the lack of close cooperation between universities and enterprises has exacerbated the shortage of scientific research and technology. 3.2 Interdisciplinary Communication is Difficult Computer simulation technology is a high degree of specialization, the complex routing is a relatively new concept, in the whole simulation technology into the teaching process, we need to provide necessary advice and guidance of physical education teachers in colleges and universities, also need more powerful sports scientific research team in colleges and universities, puts forward higher requirements to the computer simulation technology is insufficient [3]. The reality is that some universities lack research teams in sports institutes, some cannot find the right balance between the two, and some fail to connect the two. Therefore, how to seamlessly link the professional knowledge of physical education with the thinking of computer scientists is an urgent problem to be solved. 3.3 The Defect of Educational Equipment Although said that the computer simulation technology is a software development, the application, the promotion of the work, but also needs some necessary hardware equipment facilities to do the support. At present, there are many levels of colleges and universities in China, and the gap between colleges and universities is also obvious. Some remote areas, low-level colleges and non-professional colleges are generally unable to guarantee the basic hardware ratio. It is highlighted in the following aspects: 1) 2) 3) 4)

the related computer equipment and facilities are aging, the lack of necessary teaching and exhibition places, the lack of the necessary interactive communication platform, and the lack of some basic teaching tools.

Therefore, the lack of educational equipment will also restrict the application of computer simulation technology to some extent.

34

J. Lu

4 The Application of Computer Simulation Technology in the Field of Sports Science 4.1 The Application of Computer Simulation Technology in Physical Education Teaching As a new multimedia teaching method, computer simulation technology can change the traditional teaching method. This technology can show the difficult points and key points of the knowledge in different ways, and can show the teaching process more vividly, so that students can participate in the learning in a more interesting way [4]. Differentiated group teaching can be achieved before, during and after teaching, so as to ensure the maximum overall learning effect, and finally achieve the synchronous improvement of classroom teaching and training teaching. The intervention of simulation technology in teaching, through the introduction of three-dimensional teaching, on the one hand, visual simulation technology can be used to achieve vivid teaching, so that students have a sense of immersive experience in the learning process; On the other hand, the advantages of the software module of the simulation system can also be used to enhance students’ cognitive level. Differentiated group teaching can be achieved before, during and after teaching, so as to ensure the maximum overall learning effect, and finally achieve the synchronous improvement of classroom teaching and training teaching. 4.2 The Application of Computer Simulation Technology in Sports Training The discipline of computer graphics, which is very mature and widely used, captures real system data by simulating a certain phenomenon or by simulating a certain stage to optimize the quality of process control. In sports training, college physical education subjects pay attention to actual combat, pursue the data accuracy of sports variables, and stress the practicability, applicability and usability. From the mathematical model to the simulation model, and then upgraded to the model data that can be realized by the computer program, the repeated analysis of the data in this process will help us to achieve the purpose of computer simulation.

5 The Implementation and Application of Computer Simulation Technology in Physical Education Teaching Practice 5.1 Increase the Application of Computer Simulation Technology in Classroom Teaching With the continuous improvement of science and technology and the continuous development of information technology, the traditional teaching mode should be reformed in the teaching of physical education in colleges and universities. As a new teaching form, computer simulation technology should be boldly tried. Specific methods are as follows:

The Implementation and Application of Computer Simulation Technology

35

5.1.1 Preview Before Class Teachers should consciously intercept the important knowledge points of key links to do a preview, guide and properly ask students to develop the awareness and habit of pre-class learning. In order to be able to accurately guide the student to the good habits, physical education teachers should do their homework, such as early rushed out the next phase of the teaching emphasis and difficulties, clarify the cross between knowledge and be relations, at the same time, the physical education teachers to find a way to stimulate students’ thirst for knowledge and curiosity, using a herd mentality and ambience, strengthen the pre-course reading effect. 5.1.2 During the Lecture Teachers should reasonably arrange the curriculum design, mainly reflected in the following aspects: first, increase the overall proportion of computer simulation technology in time allocation. Physical education teachers can consider to spend no less than 35% of their time to do computer simulation demonstration, and then carry out about 35% of the traditional teaching, according to the simulation and the traditional teaching model grasp about 30% of the students to summarize and understand. Through this design, the proportion of computer simulation technology in classroom teaching can be strengthened, and the original teaching mode can be completely improved. Second, if we want to further guarantee the application quality of computer simulation technology, we should consider the redistribution of this period of time on the basis of 30% time allocation. 5.1.3 Review and Consolidate After Class It is necessary to use the quantitative assessment method of “time” to comprehensively supervise students’ after-class learning results, timely find out problems and provide follow-up Suggestions for improvement. To be specific, on the one hand, the traditional after-class examination method should be reformed, and descriptive assessment of technical situation should be introduced. On the other hand, students’ effective learning time on the information platform should be assessed by virtue of the advantages of information platform. 5.2 The Application of Computer Simulation Technology in Sports Training is Introduced The important content of college physical education teaching work is sports training. Considering the outstanding characteristics of sports training, such as practical operation and landing, it should be “fragmented” to insert the auxiliary means of rectifying the deviation of computer simulation technology. Specifically, it should be implemented from the following aspects: [5]. 5.2.1 Group Mode So that the trainees can establish a sense of competition, not only pay attention to their own team learning effect, but also observe the learning effect of other groups, make full

36

J. Lu

use of the advantages of computer simulation technology, form an intuitive contrast. Through horizontal comparison, timely fill their own defects, and actively learn the advantages of other groups. 5.2.2 Adopt the Mode of “One-to-One” Support Excellent first-tier students were selected from the parallel group, while the relatively weak members of the last tier were also selected. By playing the big data effect of computer simulation technology, the data differences between them were refined to make targeted rectification and improvement plans. 5.2.3 Take a “Growth Record” Approach Establish a growth profile for key students, and provide scientific advice that can be consulted, classified and guided by data records and comparisons, so as to narrow the gap among team members and effectively manage the gap improvement. 5.2.4 Take Video Recording Method After collecting videos of the technical movements of the typical representatives of the student groups, they are synchronized with the standard video movements in the same picture. The teacher makes a comparison and explanation on this basis, and the teaching effect is also very good. 5.3 The Application of Computer Simulation Technology is Introduced in the Connection of Teaching Plates In the traditional teaching process, different learning stages should be based on the students’ grasp of the situation, to teach students to consolidate and improve the content. To solve this problem, computer simulation technology can provide more alternative solutions by teaching students in accordance with their aptitude, which is a good solution. We mainly carry out the following sections: 5.3.1 Similar Teaching Plate The “splicing” process of similar teaching plates can enable computer simulation technology to play a special role. For example, training data, drill pictures, routine movements, teaching concepts and learning modes can be connected by means of editing. The splicing and series method can not only make use of the series mode of each knowledge point to complete the docking, but also complete the effective coherent connection between modules and technical actions. 5.3.2 Large Differences in the Teaching Plate The application of computer simulation technology can greatly reduce the “incompatibility” of knowledge points between teaching plates with large differences, so as to reduce the difficulty of students in the learning process. In other words, through the

The Implementation and Application of Computer Simulation Technology

37

application of computer simulation technology, the seemingly unrelated sports knowledge points are connected into a line, breaking the thinking and learning mode under the traditional perspective and traditional thinking framework. 5.3.3 Teaching Modules for Different Learning Groups In order to avoid a wide range of personality differences when learning the same knowledge structure in different learning groups, computer simulation technology can be used to avoid the phenomenon of lagging or leading in teaching progress. In view of the “lagging phenomenon”, physical education teachers can give full play to their unique advantages of “passing, helping and leading”, and use computer simulation technology to form a one-to-one private teaching model to reinforce individuals. In view of the “leading phenomenon”, physical education teachers can use the method of “collapse, pressure, correction, setback” to form a local control situation by using the computer simulation technology, which not only meets the individual’s desire for progress, but also controls the adverse influence brought by the individual to the group.

6 Conclusion In the era of information technology, computer simulation technology has been more and more fields, in order to further improve the computer technology is widely used in the field of sports, must want to have more support, is also inseparable from the technology platform constantly improve, human consciousness constantly improve and the industry as a whole application atmosphere formed a series of factors such as support [6]. It is gratifying to see that with the continuous improvement of management consciousness, the continuous enrichment of management measures, the continuous expansion of management ideas, the continuous innovation of management mode, the continuous clarity of management logic, the continuous maturity of management culture, the increasing importance of the educational and teaching reform of physical education. With the improvement of the degree of attention, the biggest change is that the progress of the informatization reform and improvement of physical education is gradually accelerated. Can really improve the teaching quality and efficiency, can effectively reduce the time cost, risk components, as long as the thinking is clear, the method is appropriate, the application of lasting, will be able to achieve and exceed the expected effect [7].

References 1. Wang, L.L.: The research on computer simulation technology in physical education and scientific. Global Hum. Geogr. 18(5), 70–73 (2012). (in Chinese) 2. Yan, G.D., Sun, J.H.: Application of computer simulation technology in PE teaching. Sport Sci. Res. 29(5), 68–70 (2008). (in Chinese) 3. Li, H.C., Li, Y.N.: The application of computer simulation technology in teaching. J. Jiamusi Vocat. Inst. 182(1), 396–398 (2018). (in Chinese) 4. Han, Z.Y.: Research on the effect of multimedia teaching on the technique teaching effect of table tennis players in college. J. Tianjin Univ. Sport (2015). (in Chinese)

38

J. Lu

5. Sun, Y.: The influence of educational technology application level on the teaching satisfaction of higher vocational education. Hebei University of Technology (2015). (in Chinese) 6. Zhang, F.: Computer simulation technology and its applications. Comput. Knowl. Technol. (Acad. Exch.) 41(10), 233–238 (2007). (in Chinese) 7. Sun, Z.: A study on the educational use of statistical package for the social sciences. Int. J. Front. Eng. Technol. 1(1), 20–29 (2019)

Construction of College Communities in the New Media Based on Network Environment Min Qiu(B) Jilin Engineering Normal University, Changchun, Jilin, China [email protected]

Abstract. The new media represented by Internet and mobile Internet are changing people’s life style, which has brought great changes to all fields of the world. The exploration and practice of information construction in colleges and universities has been carried out at home and abroad by using a variety of new media integration presently. However, the theoretical research on the construction of college communities by using new media based on network is obviously lagging behind, which cannot reflect the laws that should be followed in the construction and development of college communities under the actual conditions. On the basis of summarizing the development rules and models of college communities, this paper comprehensively uses a variety of research methods to propose related strategies for college communities construction based on the network new media environment. Based on the results of comparative research and questionnaire analysis, it summarizes the influence degree of the new media based on network during the construction of college communities to improve the competitiveness of college student associations and guide practice. Keywords: New media based on network · College communities · Construction

1 Introduction Although the operation logic of the network media platform overlaps with that of the traditional mass media, it is obviously different [1]. Which leads to different ways of producing content, distributing information and using media [2]. New media has been used in various places. Schwartz [3] shares a knowledge method of using new media online in the classroom. In the classroom space, new media can be used to properly develop the design produced by learners. Bose [4] investigated the impact of mobile devices on teaching practice, student learning and course learning outcomes. Gan [5] gained experience in the context of a mobile learning project supporting the iPad during the knowledge management course to support the University’s technology support learning vision. Niemi [6] provides a set of conceptual mediators for student driven knowledge creation, collaboration, network and digital literacy to empirically study students’ participation in learning skills in the 21st century. The successful participation of college communities in promoting social and economic development is closely related to the degree of prediction of participation in © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 39–44, 2021. https://doi.org/10.1007/978-3-030-62746-1_6

40

M. Qiu

practice in university core policies and practices [7]. Universities can provide design, planning, economic development and other strategies, concepts and policies through interdisciplinary outreach and participation in and use of service learning [8]. Brand [9] provides a theoretical basis for college communities’ connection mechanism to explain why extracurricular participation is such an important part of university experience. Xypaki [10] discusses how a bottom-up, top-down incentive and capacity-building support structure of innovative student led extracurricular activity sustainability project can achieve sustainability results and inspire other UK higher education institutions and decision makers. The partnership between university and communities can play an important role in curriculum development, but there are few reports on the role of communities’ institutions in curriculum design [11]. It is the trend of future development to manage and display all kinds of activity resources of colleges and universities comprehensively by using new media based on network, so as to realize intellectualization and digitalization on the network platform [12]. This paper intends to provide some application strategies for the construction of college communities through a variety of network new media, so as to realize the cross disciplinary resource sharing among various associations in colleges and universities, and finally improve the students’ innovative practice ability.

2 Method Colleges and universities are a starting point for college students to enter the society. Various college communities are an important part of campus culture. While cultivating students’ interests and hobbies, the communities can let the members of the associations get relevant exercises, so that college students can benefit from the experience of the associations and grow up in the future when facing employment, which is an important core of college communities’ construction. As a practical base for college students to cultivate team spirit and good values, college community is an effective platform for selfeducation and self-management of college students. In the process of building college community culture, the main problems faced by colleges and universities are as follows: 1) unreasonable organization structure distribution of the communities At present, the theoretical research-oriented or stylistic activities of college communities are relatively independent. Because most of the activities held by theoretical research are reading salons participated by internal members, the effect of the activities is not good, and the attraction to college students is low. However, the structure and activities of the members of the literary and sports associations are more diversified and more attractive to college students, but they cannot be integrated with the theoretical research associations together. 2) lack of understanding and control of the guiding concept of community development The purpose and concept of the development of college communities are the basis for distinguishing from other associations. Only around the center of the purpose and concept of the development of associations, can we better carry out the activities of college communities and all the subsequent development of communities. If every member of the communities does not fully understand and grasp the development

Construction of College Communities in the New Media

41

purpose and concept of the communities, it will affect the later development process of the communities work. 3) weak innovation and creativity In the era of rapid development of Internet technology, most communities s fail to make full use of emerging media in the way of publicity. The traditional posters cannot fully express the activities of the community and the students, and the attraction to the students is not enough to achieve the expected publicity goals. At present, there are few communities with exclusive websites, some of which have slow update speed, insufficient maintenance and poor publicity effect.

3 Research and Design of College Communities Construction Based on the Network New Media Environment 3.1 Research Methods This study intends to take the rational use of new network media as the starting point, to improve the construction of college communities culture as the goal; through the field survey, comparative research, inductive summary and other research methods to explore the construction of a resource sharing platform for college students’ communities, and according to the results of comparative study and questionnaire analysis, this paper summarizes the impact of new media on the construction of university communities. 3.2 Questionnaire Design 500 college students who have participated in the college students’ communities are taken as the survey objects in this paper. In order to better ensure the validity of the questionnaire, random samples are used to fill in the questionnaire, and the interviewees are allowed to enter the online questionnaire page to fill in. The main part of the questionnaire is about the perception, attitude and participation of the students to the existing college communities analysis, and draws relevant research data and conclusions. A total of 495 online questionnaires were received and 483 were valid.

4 Investigation and Analysis of the Effect of College Communities in the New Media Environment 4.1 Analysis of Application Effect by Popularity and Perceived Importance According to the relevant data, this paper analyses the impact of the new media environment based on the network on the construction of college students’ communities through the in-depth mining of the network survey data. This paper uses popularity and perceived importance to investigate the importance of college students in the construction of college students’ communities constructed by different network new media. The results are shown in Fig. 1. It can be found from Fig. 1 that college students think that the campus website is the most important among the four different network new medias, 100% of students think

42

M. Qiu

Fig. 1. the importance of the construction of college communities in different network new media

that the campus website is very important for the construction of community culture, while the “small video” is the least important digital new media, but more than 50% of students recognize its importance in the construction of College communities. The results of calculating perceived importance show that most of the sub items in the survey are more important than their popularity in this paper. The differences of the sub items of digital video among them are the largest, while the three items of campus website, microblog and wechat are not significantly different. The data of perceived importance proves the importance of these sub items to the construction of college communities, and measures must be taken to improve the use of these sub items. 4.2 Research Result It is found through the above investigation and research that the application strategies of the construction of college communities in the new media environment based on network are as follows: 1) using the network new media platform to improve students’ perception of college communities construction The 483 students who have participated in the survey all think that it is necessary to construct the college communities by using the new media based on network. 97.91% of the students think that they can more vividly show the development process and objectives of the community culture through the new media on the Internet, and improve the atmosphere of the community culture construction in a more comprehensive way. 2) provide corresponding innovation mechanism of community with the help of new media based on network technology

Construction of College Communities in the New Media

43

College communities should be clear about the needs of the organizations, constantly adjust and innovate on the basis of the development of different periods, and improve the quality of the development of associations. 93.37% of the students think that they can use the power of new media to tap the comprehensive ability of the members of the community and carry out the assessment criteria, so as to provide guarantee for the cultivation and promotion of the backbones in the later period.

5 Conclusion The construction of college communities is a complex and huge systematic project. Detailed planning and reasonable distribution are essential to ensure the sustainable and healthy development of community construction. The purpose of this study is to integrate all kinds of new media communication tools and media on the network platform, to make them play a collaborative role in the construction of college students’ community culture, to spread consistent and coherent college students’ community information to college students, to establish a stable two-way communication relationship with them, and to use new media on the network The effect of community construction is evaluated dynamically and circularly, so as to reach the goal of Influencing College Students’ values and learning behaviors. Acknowledgements. The Funds Program: The 13th Five- year Plan of Jilin Province Science of Education the key Research topics of the new ways of Ideological and political education based on the activities of College Students’ Associations ZD19093.

References 1. Hurrah, N.N., Parah, S.A., Loan, N.A., Sheikh, J.A., Elhoseny, M., Muhammad, K.: Dual watermarking framework for privacy protection and content authentication of multimedia. Future Gener. Comput. Syst. 94, 654–667 (2019) 2. Klinger, U., Svensson, J.: The emergence of network media logic in political communication: a theoretical approach. New Media Soc. 17(8), 1241–1257 (2015) 3. Schwartz, L.H.: A funds of knowledge approach to the appropriation of new media in a high school writing classroom. Interact. Learn. Environ. 23(5), 595–612 (2015) 4. Bose, D., Lowenthal, P.R.: Integrating mobile devices into the classroom: a qualitative case study of a faculty learning community. Int. J. Soc. Media Interact. Learn. Environ. 4(4), 319–332 (2016) 5. Gan, B., Menkhoff, T., Smith, R.: Enhancing students’ learning process through interactive digital media: new opportunities for collaborative learning. Comput. Hum. Behav. 51, 652– 663 (2015) 6. Niemi, H., Multisilta, J.: Digital storytelling promoting twenty-first century skills and student engagement. Technol. Pedagogy Educ. 25(4), 451–468 (2016) 7. Mtawa, N.N., Fongwa, S.N., Wangenge-Ouma, G.: The scholarship of university-community engagement: interrogating Boyer’s model. Int. J. Educ. Dev. 49, 126–133 (2016) 8. Laninga, T., Austin, G., McClure, W.: University-community partnerships in small-town Idaho: addressing diverse community needs through interdisciplinary outreach and engagement. J. Community Engagem. Scholarsh. 4(2), 2 (2019)

44

M. Qiu

9. Branand, B., Mashek, D., Wray-Lake, L., Coffey, J.K.: Inclusion of college community in the self: a longitudinal study of the role of self-expansion in students’ satisfaction. J. Coll. Student Dev. 56(8), 829–844 (2015) 10. Xypaki, M.: A practical example of integrating sustainable development into higher education: green dragons, city university London students’ union. Local Econ. 30(3), 316–329 (2015) 11. Lewis, L.A., Kusmaul, N., Elze, D., Butler, L.: The role of field education in a university– community partnership aimed at curriculum transformation. J. Soc. Work Educ. 52(2), 186– 197 (2016) 12. Thakur, S., Singh, A.K., Ghrera, S.P., Elhoseny, M.: Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools Appl. 78, 3457–3470 (2019)

Political and Ideological Personnel Management Mode Based on Computer Network Siqi Pu(B) Scientific Bureau, China West Normal University, Nanchong 637009, Sichuan, China [email protected]

Abstract. Computer network as a representative of a new economic form, under the impact of its wave of reform, the prevalence of emerging technologies of mobile Internet represented by big data, cloud computing, and the Internet of Things will definitely trigger new round of technological revolution and Industrial change, at the same time, these industrial developments that are transformed and transformed by computer networks are inseparable. Therefore, research on the development status of the integration of vocational education, education and education in the context of computer networks, with the help of computers Advantages and characteristics of the network It is of practical significance to improve the problems in talent-training model of production and education, thus improving the quality of political and ideological personnel training and enhancing the ability of talents to serve the society. This paper reforms the management mode of political and ideological talents from the aspects of educational concept, educational content structure, teaching methods, evaluation system and teaching staff, promotes the connotative development of political and ideological talent management mode, and realizes the improvement of teaching quality and quality of personnel training. The cause of socialism with Chinese characteristics fosters high-quality and innovative talents with both ability and political integrity and comprehensive development, providing sufficient human support and intellectual security to improve independent innovation capabilities and build innovative countries. Keywords: Computer network · Talent training · Political and ideological · Talent management

1 Introduction With the development of the economy and the rapid advancement of science and technology, competition among countries in politics, culture, military and other fields has intensified, and these competitions are ultimately the competition of talents [1–4]. The current innovative talent training as a major measure to improve China’s overall national strength is getting more and more attention, and college students as the main source of talents and an important force to promote future social development can not be ignored, so the study of political and ideological talent management model has become The era has given important historical tasks to higher education [5–7]. As an important base for © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 45–52, 2021. https://doi.org/10.1007/978-3-030-62746-1_7

46

S. Pu

the cultivation of high-quality talents, universities should adhere to the cultivation of innovative talents and new requirements in the new era, focus on the innovation of the management mode of students’ political and ideological talents, enrich the connotation of higher education, promote the modernization of higher education, and provide more for the long-term development of society [7]. Solid talent protection [8–11]. At the same time, the management of political and ideological talents of college students is also a measure of the cultivation of innovative talents in the new era, which helps to provide a solid guarantee for the cultivation of innovative talents and provides more long-term motivation support [12]. As an important educational force, political and ideological talent management must adapt to the development of the times and constantly make self-adjustment in order to achieve long-term development. The task of cultivating talents is not only the mission of the management of political and ideological talents, but also the innovation of political and ideological education. The important driving force and main content of development [13, 14]. Through the practical exploration of talent management and the experience of advanced talent management at home and abroad, this paper discusses the new challenges and characteristics in the talent management practice during the period of innovation and development, and discusses the characteristics, effects and safeguards of the new talent management model. In the analysis, we put forward targeted suggestions on talent management methods, key links, and implementation.

2 Analysis of the Reasons Affecting the Management Model of Political and Ideological Talents of College Students (1) Outdated Ideas of political and ideological Talents Management Educational concept is the theoretical guidance for carrying out educational work. To achieve good results in education, scientific educational concept is needed. The management of political and ideological talents is an important part of ideological work. It shapes the world outlook, outlook on life and values of College students, and needs more guidance from scientific concepts [15]. However, most of the political and ideological personnel management workers in Colleges and universities have outdated educational concepts, mistakenly regard the political and ideological personnel management of college students as campus stability, so as to ensure that college students do not have accidents. This concept makes some political and ideological personnel management workers focus on the management of students. In addition, some educators only regard the management of political and ideological personnel of college students as a means of livelihood, and have not really studied how to do a good job of education. In addition, a considerable number of political and ideological personnel management workers are not specialized in education, have not received systematic education training, lack of understanding of students, nor have they carefully analyzed the characteristics of students, and are carrying out political and ideological personnel management work. At the same time, neglecting students’personality and adopting the “one-size-fits-all” approach arouse students’ disgust and greatly reduce the educational effect.

Political and Ideological Personnel Management Mode

47

(2) The content of political and ideological personnel management lacks attraction. At present, the content of political and ideological talent management in Colleges and universities mainly includes the curriculum of political and ideological theory course. Although the curriculum is compiled by authoritative experts organized by the Ministry of Education, because the curriculum itself is an introduction to the basic theory of Marxism, and because the political nature of the curriculum is strong, the attraction of the textbook itself is not enough; some teachers of political and ideological theory course do not prepare lessons carefully when they teach. Without analyzing the needs of students, they only copy the contents of textbooks, ignoring the knowledge that students must absorb in their development, which makes the content of education dull and lacks the attraction for students. Some managers of political and ideological personnel blindly preach to the students, express their words over and over again, without new ideas, which arouses students’disgust. It can not only fail to achieve the effect of political and ideological personnel management, but also cause students’ rebellious psychology to some extent, weakening the effectiveness of political and ideological personnel management. (3) The single management mode of political and ideological talents Rich education and teaching methods are very important in the process of teaching and help to improve the educational effect. Therefore, in order to improve the effectiveness of political and ideological talent management, we should try our best to adopt a variety of educational methods. At present, there are serious deficiencies in the management of political and ideological talents. Political and ideological theory course is the main channel for the management of College Students’ political and ideological talents. It should play an important role in the management of College Students’ political and ideological talents. However, the current political and ideological theory classroom has the problems of single mode of education and lack of innovation in education and teaching. Campus activities are obsolete in theme, immobilized in form and lack of novelty. Students are required to participate in the activities in the form of organization and apportionment. It seems that the activities are carried out well, but in fact they lack effective educational effect. The singularity of education mode makes students lose interest in participating in learning, which directly affects the effectiveness of education.

3 Bayesian Network In order to better study the attribute relationship of ideological and political talent management and establish research models, this paper studies the management of ideological and political talents with the advantage of Bayesian network. Bayesian network node relationships can describe conditional independent assumptions, The Bayesian network specifies that each node Vi condition in the graph is independent of any subset of nodes given a non-descendant node by the parent node of the node, That is, if we use A(Vi ) to represent any subset of nodes formed by not descendant node of Vi , and F(Vi ) to represent the parent node of Vi , then the conditional probability of Vi node can be expressed as formula 1.

48

S. Pu

p(Vi |A(Vi ), F(Vi )) = p(Vi |F(Vi ))

(1)

1) A conditional probabilities table associated with each node. The conditional probability p(Vi |F(Vi )) represents the relationship between the node Vi and the parent node. A node without any parent node is called a priori probability, so a joint probability can be expressed in terms of a conditional probability link, and the expression can be described as formula 2:

n

p(V1 , V2 , . . . , Vk ) = F P(Vi |Vi−1 , . . . V1 )

(2)

i=1

4 New Trends in Talent Management Brought About by Changes in the Competitive Landscape of the Industry China’s macro-economy has entered a new normal state. By building a multi-level capital market and responding to the call of “mass entrepreneurship and innovation”, meeting the needs of entrepreneurial, innovative and growth-oriented enterprises in the capital market is a new historical mission facing various industries. At the same time, it is also a new transformation and development opportunity for the industry. In the capital and talentintensive industries, the rapid development of the industry has brought about the hunger for talents, and the environment for talent development has been increasingly optimized. Both the national and regulatory levels of the institutional and cultural environment have made great progress, and they are the industry’s talents. Create a vibrant, innovative and orderly environment. The industry has become more attractive to talents, and the number and quality of the talent team have continued to show a good trend. However, there is still a certain gap between the overall level of talent development in the industry and the actual demand for economic and social development and the increasingly international requirements for capital market development. The change in the market competition pattern has brought about a new trend in industry talent management: (1) Diversified talent competition. With the increase of competition subjects, the competition for high-end talents in the industry will become more intense, and it will become the new normal of talent competition. How to attract and retain key talents becomes the key to talent management. (2) Integration of talent capabilities. With the diversification of business and the need for innovation and development, the direction of talent cultivation is a comprehensive talent with comprehensive ability. The integration of talents and abilities can be seen from the thoughts and achievements, as shown in the Fig. 1. (3) Diversified talents. Due to the limitations of the system and mechanism, the industry is currently focusing on short-term incentives, lack of long-term incentive tools such as equity, and the loss of excellent talents and the frequent cross-cutting of the

Political and Ideological Personnel Management Mode

49

30 20 10 0 thought

Speaking

Grade

Interview

Fig. 1. Comparison of talent comprehensive ability

industry have affected the healthy development of the industry. With the intensified competition within the industry and the external impact of various new formats, enterprises have begun to attach importance to long-term incentives such as research and use of equity. In the context of the domestic market-oriented reforms and the deepening of state-owned enterprise reforms, enterprises are in the incentive mechanism. It will also be in line with international standards. (4) Systematization of talent management. First, the key to increasing organizational support is the maximization of employee positions and a supportive work environment. While strengthening employee engagement and loyalty, it is becoming more and more important to improve organizational support from the aspects of building corporate culture and improving talent management system. new trend. Second, with the 80s and 90s, it has become a new force that cannot be ignored in the workplace. They are uniquely challenging the management of the workplace. Whether it is the view of career choice, the reason for leaving the job, the acquisition of professional accomplishment, or even the setback situation, the thinking scope after 80 and 90 has exceeded the experience gained by traditional talent management, and has become a challenge that needs to face in talent management. In the eyes of the new generation, attention to personal growth has replaced salary and become the most important gravitation of a job. The third is the informatization of management tools. After the introduction of ERP, CRM and other information management tools in talent management, with the promotion and application of information technology, contemporary Internet technologies represented by big data and cloud computing provide a new perspective for in-depth study of talent management [16] means. The comparison is shown in the Fig. 2.

Fig. 2. Contrastive analysis of management

50

S. Pu

5 Effective Ways of Political and Ideological Talents Management Based on Computer Network (1) Adhere to the guiding position of Marxist theory and arm the minds of College Students As the backbone of building socialism in the future, innovative talents must have correct political standpoint and attitude to ensure the correct direction of innovative activities and to choose the right innovative targets, so that their innovative activities and innovative achievements can promote social development and progress. The teaching of Marxist Zhuangben Principle is enough to guide the correct political direction and road. It is necessary to arm the minds of college students with the latest theoretical achievements of the Sinicization of Marxism, guide them to consciously use Mao Zedong Thought and the theoretical system of socialism with Chinese characteristics to guide their innovative practice, and keep the innovative practice in the right direction all the time, with advanced, revolutionary and revolutionary nature. People’s character will eventually merge into the historical torrent of the construction of socialism with Chinese characteristics rolling forward. (2) Enhancing College Students’ Sense of Social Responsibility with Patriotism as the Core of National Spirit With patriotism as the core, the national spirit inspires college students with the glorious course of the Chinese nation’s self-improvement and perseverance, and the sense of mission and responsibility of realizing national rejuvenation. It provides them with a stable and lasting source of power in the process of transforming into innovative talents, as well as a driving force for their continuous innovation. This sense of responsibility makes them regard serving national progress, national development and human happiness as the starting point and ultimate destination of innovation activities. With this moral responsibility and humanistic care, we can truly feel the call of practice, the pulse of the times, and find problems, raise problems and solve them in rich and colorful practice, so as to create new achievements [17]. (3) Ideas of political and ideological Education should be renewed In order to renew the teaching idea, efforts should be made to renew the educational thinking. Traditional political and ideological education of college students generally uses ready-made thinking mode, and under the guidance of this thinking mode, political and ideological education in Colleges and universities presents the characteristics of abstract isolation and solidification of education. To enhance the effectiveness of political and ideological education, we need to update the educational concept, change educational thinking, and guide political and ideological education with generative thinking. The generative way of thinking emphasizes that we should pay attention to human development and follow the law of human growth and development. political and ideological education of college students should pay attention to students themselves, regard students as the main body of political and ideological education, pay close attention to

Political and Ideological Personnel Management Mode

51

students’ideological trends at all times, adjust education content and teaching methods according to changes, make students the center of attention of education at all times, and then do a better job of political and ideological education and improve the effectiveness of political and ideological education.

6 Conclusion Political and ideological education should play the role of guidance, development, construction and regulation in the training of talents under the background of computer network. However, it is affected and restricted by such factors as classroom teaching, evaluation system, teachers and external environment, and the effect of its function is unsatisfactory. The management mode of political and ideological talents for college students should be a systematic project that the whole society makes joint efforts. The factors and variables involved in the construction and improvement of the training system are numerous and complex. This paper only analyses the factors that restrict its function in the cultivation of innovative talents for college students from the perspective of internal factors and external environment of political and ideological affairs, and puts forward some ways and suggestions accordingly. The management mode, mechanism and system of political and ideological talents for college students have not been discussed in depth. Of course, the approaches and suggestions put forward in this paper are only for reference.

References 1. Baowei, J.: Research on improving the political and ideological qualities under the background of network information technology. In: Seventh International Conference on Measuring Technology & Mechatronics Automation, pp. 2–6. IEEE (2015) 2. Li, F.: Research method innovation of college students’ political and ideological education based on cognitive neuroscience. NeuroQuantology 16(5) (2018) 3. Qiu, J.: A kind of political and ideological education management platform design based on web technology. In: IEEE 2017 International Conference on Robots & Intelligent Systems (ICRIS) – Huai’an, 15–16 October 2017, pp. 1–4 (2017) 4. Kljun, N., Sprenger, M., Schär, C.: Frontal modification and lee cyclogenesis in the Alps: a case study using the ALPEX reanalysis data set. J. Hubei Correspondence Univ. 78(1–2), 89–105 (2016) 5. Westerdale, J.: Walter Ruttmann and the cinema of multiplicity: avant-garde – advertising – modernity by Michael Cowan (review). German Stud. Rev. 40(2), 435–437 (2016) 6. Ren, Z.-Y., Li, X.-X.: Reflecting on the wisdom of great minds to promote the, double first-rate construction. Univ. Educ. Sci. 123 (2017) 7. Ewees, A.A., El Aziz, M.A., Elhoseny, M.: Social-spider optimization algorithm for improving ANFIS to predict biochar yield. In: 8th International Conference on Computing, Communications and Networking Technologies, ICCCNT 2017 (2017). 8203950 8. Kaminski, M.M., Nalepa, M.: Suffer a scratch to avoid a blow? Why post-communist parties in Eastern Europe introduce lustration. Center for the Study of Democracy (2017) 9. He, L., Ding, X., Zhang, Z.: Research on extracurricular training and contributing factors of innovative talents-based on the investigation of University-Enterprise Clubs. Adv. Sci. Lett. 22(8), 2057–2061 (2016)

52

S. Pu

10. Li, G., Fang, H., Zheng, L., Yang, B.: Research on optimal design of the injection mold parting direction based on preference relation. Int. J. Adv. Manuf. Technol. 79(5–8), 1027–1034 (2015) 11. Huang, S., Wang, L., Liu, L., et al.: Nanotechnology in agriculture, livestock, and aquaculture in China a review. Agron. Sustain. Dev. 35(2), 369–400 (2014) 12. Ai-Ju, L., Hua, T.: Social entrepreneurship education: new development in, college entrepreneurship education. Univ. Educ. Sci. 125 (2017) 13. Salys, R.: The pattersons: expatriate and native son. Russ. Rev. 75(3), 434–456 (2016) 14. Kaplis-Hohwald, L.: Building the temple in verse: a reading of Juan de Jáuregui’s Octavas in praise of Philip IV. Hispanófila 173, 117–129 (2015) 15. Shankar, K., Elhoseny, M.: Trust based cluster head election of secure message transmission in MANET using multi secure protocol with TDES. J. Univers. Comput. Sci. 25(10), 1221–1239 (2019) 16. El-Hasnony, I.M., Barakat, S., Elhoseny, M., Mostafa, R.R.: Improved feature selection model for big data analytics. IEEE Access 8(1), 66989–67004 (2020) 17. Krishnaraj, N., Elhoseny, M., Lydia, E.L., Shankar, K., ALDabbas, O.: An efficient radix triebased semantic visual indexing model for large-scale image retrieval in cloud environment. Softw. Pract. Experience (2020, in Press)

Analysis of Mapping Knowledge Domain on Health and Wellness Tourism in the Perspective of Cite Space Cheng Wang1(B) , Huifan Luo2 , and Ronghong Wang3 1 School of Tourism and Economy Management, Lijiang Teachers College, Lijiang 674199,

Yunnan, China [email protected] 2 School of International Culture Exchange, Lijiang Teachers College, Lijiang 674199, Yunnan, China 3 Tourism Research Center, Lijiang 674199, Yunnan, China

Abstract. This research is aimed to reveal the situations of studies on health and wellness tourism, which will also provide theoretical guide for those who has been involved in or will be involved in this field. Taking Cite space as the analysis tool this research proceeds by means of online visual analysis of database, which has been collected through mapping knowledge domains including keyword burstiness, keyword cluster and sigma. It has been discovered that the research frontier of China’s health and wellness tourism has been developing and diversifying including wellness tourism, towns of health and wellness tourism, destinations of health and wellness tourism, health and wellness tourism productions, health and wellness tourism industries, rural revitalization, ecological tourism and development paths etc. Conclusions have been arrived that in recent years, studies on China’s health and wellness tourism have been started, at a stage of exploring, whose theoretical study lags behind practice. It is necessary to improve the quality of theoretical study of China’s health and wellness tourism to guide its green development, ecological development and healthy development with unlimited potentials. Keywords: Health and wellness tourism · Mapping knowledge domain · Research frontier · Cite space

1 Introduction Outline of China’s 2030 Health Plan noted that: “It is vital to promote the relations between wellness and retirement, tourism, internet, entertainment, fitness and food, in order to foster new industry, new forms of industry and new modes of health.” [1] China National Tourism Administration issued Standards on Demonstrative Bases of National Health and Wellness Tourism (LB/T051—2016) (abbr. Standards) and authorized first 5 National Demonstrative Bases [2]. Furthermore, in March 2018, Ministry of Culture © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 53–59, 2021. https://doi.org/10.1007/978-3-030-62746-1_8

54

C. Wang et al.

and Tourism of PRC authorized first 73 companies which launched national health and wellness tourism of Chinese Traditional Medicine. It is thriving a new mode of tourism industry: “tourism + health and wellness”, which arouses people’s concern on tourism and health theoretically and practically [2]. Through the bibliographic analysis, it explores that western countries have a thorough study on health and wellness tourism, which practically emphasizes more on how medical tourism policies influence travelers of medical tourism and residents of tourism destinations [3–9]. However, compared with the splendid history of people’s wellness, China’s health and wellness tourism has just launched with a quite short history and there’s a long way to go to compare with western health and wellness tourism [3]. Taking “health and wellness tourism” as the keywords and retrieving in CNKI, this study finds no results reported on bibliometrics based on Cite space concerning health and wellness tourism. Hence, this research is to show China’s situations, trends and developments of studies on health and wellness tourism, in order to offer theoretical guides for those who has been involved in or will be involved in this field. To conclude, visual analysis online of health and wellness tourism is of great academic importance and immediate significance.

2 Research Methods and Data Sources 2.1 Research Methods [10–12] Cite space, an online visual software, was created by Prof. Chaomei Chen of Drexel University. Taking Cite space (5.5.R2 edition) as the tool, this study conducted a case study on bibliometrics of China’s health and wellness tourism in 2009, which analyzed the data collected through mapping knowledge domains including keyword burstiness, keyword cluster and sigma. The meaning of 3 mapping knowledge domains is as follows: first, keyword burstiness is to identify the variation tendency of subjects according to the time sequence and then to find the research frontier in this field. Second, keyword cluster is to assemble key words of close relations which are to be clustered. Each key word is given a number and the key word with largest number is to be elected as the representative with a tag. The smaller the numbers are, the more the keywords are. Third is for sigma, formula is as follows:  = (centrality + 1)burstiness

(1)

2.2 Data Sources This research sets CNKI as the retrieval source, health and wellness tourism as the retrieval subject, 2019 as the time of literatures, all journals as the literature resource, through which 275 Chinese articles are retrieved and 262 are chosen to be samples, in which 13 passages are canceled because there’s re no authors or the subjects are not appropriate.

Analysis of Mapping Knowledge Domain on Health and Wellness Tourism

55

3 Online Visual Analysis Based on Citespace V [10–12] 3.1 Analysis of Keyword Burstiness When Cite space (5.5.R2 edition) was set as the tool in order to calculate the literature database of health and wellness tourism, the parameters are set as the following: ➀ Configure the detection model:     (2) f (x) = ae−ax a1 a0 = 2, ai ai−1 = 2 ➁ The number of states = 1. ➂ ϒ = 0.4, ϒ ranged [0, 1]. ➃ Minimum Duration = 1. The calculation is in Table 1. The result indicates that among the strongest citation keyword burstiness, research frontiers of health and wellness tourism are sequenced Table 1. Top 20 keywords with the strongest citation bursts Keywords

Year

Strength

Begin

End

Timespan: 2009–2019

H & W Tourism

2009

8.6999

2015

2017



H&W Industry

2009

4.097

2015

2017



Forests H&W

2009

3.2412

2016

2017



Panzhihua City

2009

1.9623

2015

2015



H&W

2009

1.8788

2016

2017



Wellness Tourism

2009

1.5647

2017

2019



Distinctive Towns

2009

1.5131

2018

2019



Holiday Resort of H&W Tourism 2009

1.3343

2015

2015



Travelers of H&W Tourism

1.1609

2017

2017



2009

PRC

2009

1.1609

2017

2017



Sichuan

2009

1.1609

2017

2017



Hot Spring Tourism

2009

1.1609

2017

2017



Leisure Travel

2009

1.1609

2017

2017



H&W Tourism Destination

2009

1.1302

2018

2019



H&W Tourism Product

2009

1.1302

2018

2019



H&W Tourism Industry

2009

1.1302

2018

2019



Rural revitalization

2009

1.1302

2018

2019



Ecological Tourism

2009

1.1302

2018

2019



Products Development of H&W Tourism

2009

1.1302

2018

2019



Development Paths of H&W Tourism

2009

1.035

2017

2019



Notes: ➀ the form of key words is slightly changed according to the analysis. ➁ signified Keywords with the Strongest Citation Bursts. ➂ Health and Wellness (abbr. H&W).

56

C. Wang et al.

in descending order as the following: wellness tourism (1.5647), distinctive towns (1.5131), tourism destination (1.1302), H&W Tourism Products (1.1302), tourism industry (1.1302), rural revitalization (1.1302), ecological tourism (1.1302), tourism productions development (1.1302), development paths (1.035). 3.2 Evolutionary Path of Research Subjects Citespace.5.5.R2 was set as a tool, to assemble and cluster literature data of China’s health and wellness tourism. There are two standards to judge the results of cluster: ➀ Modularity is the Q, indicating a remarkable cluster structure when Q is higher than 0.3. ➁ Mean Silhouette is the S, indicating a reasonable remarkable cluster structure when Q is higher than 0.5. The bibliometrics of China’s health and wellness tourism shows: ➀ Q = 0.6796, revealing a remarkable cluster structure ➁ S = 0.451, revealing a reasonable cluster structure. ➂ There exists 7 clusters of China’s bibliometrics. From the greatest to the least, they are development paths (#0), influence factors (#1), construction of health and wellness tourism demonstrative bases (#2), health tourism (#3), wellness tourism (#4), forests health and wellness tourism (#5), health and wellness industry (#6). On the basis of cluster analysis, this research takes Citespace.5.5.R2 as a tool to calculate, whose calculation is two indexes: Centrality and Burstiness. Centrality and burstiness are compounded into a Sigma, which is to identify creative literatures and subjects (in Table 2) and analyze results of cluster in order to study the evolutionary paths and evolutionary situations of China’s health and wellness tourism. The main evolutionary laws are as follows: ➀ From the perspective of research subject, research on China’s health and wellness started as the publication of the article the International Tourism Island: Health and Wellness Tourism in Hainan [13]. There are approximately two developing stages revealed in the research results: stagnating in 2009–2014 and rising in 2015–2019. The evolutionary trend is becoming diversified, in which some traditional research subjects are continuously substituted by new ones. To be specific, firstly, parts of the research subjects last for a short time, for instance, some key words only existed in one year including Panzhihua City, Travelers of Health and Wellness, Health and Wellness Resort Area, China, Sichuan, Hot Spring Tourism, Leisure Tourism. In addition, little results have been reported in recent years, concerning health and wellness tourism, health and wellness tourism industry, and forests health and wellness tourism etc. Secondly, newly- developing subjects are diversifying into different branches as wellness tourism, distinctive towns, tourism destinations, tourism products, tourism industry, rural revitalization, ecological tourism, tourism products development, development paths etc. After studying the literatures of China’s health and wellness tourism, a main problem has aroused that the research subjects are distracting, with a deficiency of profound and systematic studies. Chinese scholar Ren Xuanyu maintained in 2016 that there was no profound academic study on health and wellness tourism at home and abroad [14].

Analysis of Mapping Knowledge Domain on Health and Wellness Tourism

57

Table 2. Summary table sorted by sigma (CC ≥ 3) Citation Counts (CC)

Burstiness

82 25

Centrality

Sigma

Keyword

0.57

1.00

H&W Tourism

0.46

1.00

Forests H&W

0.25

7.19

Tourism

17

0.47

1.00

All-for-one Tourism

10

0.11

1.00

H&W

8

0.00

1.00

Forests H&W Tourism

0.10

1.47

Industry

8

0.31

1.00

Development paths

7

0.00

1.00

Wellness Industry

6

0.10

1.00

Wellness Tourism

19

8

6

8.70

4.10

0.15

1.56

Forests

5

3.24

0.20

1.00

Rural Tourism

5

0.05

1.00

Panzhihua City

5

0.45

1.00

Medical &Wellness

5

0.06

1.00

SWOT

5

0.03

1.00

AHP

5

0.00

1.00

H&W Tourism Industry

4

0.13

1.00

Distinctive Towns

4

0.08

1.00

Development

3

0.01

1.00

Tourism Products

3

0.10

1.00

Space Structure

3

0.01

1.00

Health Tourism

3

0.02

1.00

Shandong Province

3

0.00

1.00

Rural Revitalization

3

0.00

1.00

Influence factors

3

0.00

1.00

Tourism Destination

3

0.00

1.00

Tourism Industry

3

0.05

1.00

Ecological Tourism

3

0.00

1.00

Industry Integration

3

0.05

1.00

Tourism Production Development

58

C. Wang et al.

4 Conclusion Conclusions have been come as the following: ➀ China’s research on health and wellness tourism are diversifying, whose research frontiers consist of wellness tourism, distinctive towns, destination, products, industry of health and wellness tourism, as well as rural revitalization, ecological tourism, production development and development paths of health and wellness. ➁ There are 7 clusters of China’s bibliometrics, including development paths, influence factors, construction of health and wellness tourism demonstrative bases, health tourism, wellness tourism, forests health and wellness tourism and health and wellness industry. ➂ Studies on China’s health and wellness tourism have been started and is proceeding, at a stage of exploring, whose theoretical study lags behind practice. It is necessary to improve the quality of theoretical study of China’s health and wellness tourism in order to guide its green development, ecological development and healthy development with unlimited potentials. Acknowledgments. This work was supported by Tourism Management, Key Major of Advanced Vocational Education of Yunnan (project number: YN 2018083).

References 1. Yang, X.-c., et al.: The spatial distribution characteristics and influence factors of health and wellness tourism resources in Fujian province. J. Fujian Normal Univ. (Nat. Sci. Ed.) 35(5), 106–116 (2019). (in Chinese) 2. Liu, A.-l., et al.: Investigation and evaluation of health and wellness tourism resources in Liupanshui. J. Liupanshui Normal Univ. 30(6), 18–23 (2018). (in Chinese) 3. Xie, X., et al.: The research of China’s healthy tourism pattern in the regional characteristic towns. Ecol. Econ. 34(9), 150–154 (2018). (in Chinese) 4. Snyder, J., Crooks, V.A., Johnston, R., et al.: Medical tourism’s impacts on health worker migration in the Caribbean: five examples and their implications for global justice. Global Health Action 8(S2), 1–9 (2015) 5. Crooks, V.A., Labonté, R., Ceron, A., et al.: “Medical tourism will…obligate physicians to elevate their level so that they can compete”: a qualitative exploration of the anticipated impacts of inbound medical tourism on health human resources in Guatemala. Hum. Resour. Health 17(1), 1–11 (2019) 6. Jain, V., Ajmera, P.: Quantifying the variables affecting Indian medical tourism sector by graph theory and matrix approach. Manag. Sci. Lett. 8(4), 225–240 (2018) 7. Honda, N.H., Aoki, K., Kamisasanuki, T., et al.: Isolation of three distinct carbapenemaseproducing Gram-negative bacteria from a Vietnamese medical tourist. J. Infect. Chemother. 25(10), 811–815 (2019) 8. Mahmoudifar, Y., Tabibi, S.J., Nasiripour, A.A., et al.: Effective factors on the development of medical tourism industry in the West Azerbaijan Province, Iran: pattern presentation. Int. J. Med. Res. Health Sci. 5(7S), 620–630 (2016) 9. Carly, J., Jeremy, S., Crooks, V.A., et al.: Exploring isolation, self-directed care and extensive follow-up: factors heightening the health and safety risks of bariatric surgery abroad among Canadian medical tourists. Int. J. Qual. Stud. Health Well-Being 14(1), 161–3874 (2019) 10. Chen, C.: Information visualization. Wiley Interdiscip. Rev. Comput. Stat. 2(4), 387–403 (2010)

Analysis of Mapping Knowledge Domain on Health and Wellness Tourism

59

11. Chen, C., Ibekwe-SanJuan, F., Hou, J.: The structure and dynamics of co-citation clusters: a multiple-perspective co-citation analysis. J. Am. Soc. Inf. Sci. Technol. 61(7), 1386–1409 (2010) 12. Chen, C.: Science mapping: a systematic review of the literature. J. Data Inf. Sci. 2(2), 1–40 (2017). Expert review 13. Wang, Z.: The international tourism Island: health and wellness tourism in Hainan. Hainan Today 12(12), 12 (2009). (in Chinese) 14. Ren, X.: Health and wellness tourism: connotation analysis and development paths. Tour. Tribune 31(11), 1–4 (2016). (in Chinese)

Application of Smart Retail Mode in Suning.Com Jinzhi Zhai(B) Liaoning Vocational Technical College of Modern Service, Shenyang, Liaoning, China [email protected]

Abstract. The core connotation of “smart retail” is to use Internet and Internet of Things technologies to feel consumption habits, predict consumption trends, guide production and manufacturing, and provide diversified and personalized products and services for consumers. Smart retail has realized the deep integration of real industries and new technologies, which breaks the situation of unilateral development online and offline. According to the actual needs of consumers, it has injected new vitality into the development of traditional retail through the mode of online and offline integration. Taking Suning.com as the research object, this paper analyzed the main problems faced by the application of smart retail mode, and put forward feasible development paths to promote the long-term development of China’s traditional retail industry. Keywords: Suning.com · Smart retail mode · Application

1 Introduction With the change of customers’ shopping preferences and the vigorous rise of online retail, the original marketing methods of retail enterprises are no longer adapted to the new changes. Copying the traditional retail development mode leads to many disadvantages such as high cost and lagging response. The “smart retail mode” is the key attempt to solve this major problem. The “smart retail mode” mode, which is still in the exploratory stage, needs benchmarking enterprises that dare to set up flags to do something. Therefore, this paper deeply studied the reform and innovation measures taken by Suning.com (hereinafter referred to as Suning), a traditional retail enterprise.

2 Importance of Traditional Retail Enterprises Opening Smart Retail Mode The traditional retail industry is experiencing sluggish growth, sharp decline in profits and serious loss of customers. Reports of “closing tide” are constantly appearing in the media. In 2018, China’s total retail sales of social consumer goods reached 38.1 trillion yuan, up 9% year-on-year, a slight decrease from the same period last year. Under the © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 60–67, 2021. https://doi.org/10.1007/978-3-030-62746-1_9

Application of Smart Retail Mode in Suning.Com

61

“stagnancy” of slowing down the overall growth rate of the retail industry, Suning’s rapid expansion and outbreak against the trend in recent years have precisely grasped the opportunity of the retail industry reform. The scene that Suning vigorously promotes, the Internet, has become the consensus of the future development of the retail industry. Facing the grim situation, traditional retail enterprises urgently need to innovate their business modes. At the same time, with the popularization of mobile Internet, Ecommerce has been further developed. Online shopping has also been accepted by more and more consumers and has gradually become the most mature and popular way of shopping. It is also clear to us that, after years of development, with the improvement of income level and the change of consumption habits, the advantages of low-cost, low-price and convenient online shopping have begun to weaken, the growth rate of e-commerce has begun to slow down, the flow dividend of e-commerce enterprises has begun to shrink, the defects of e-commerce itself have begun to emerge, and have become the shackles restricting the development of e-commerce enterprises [1]. In this process, consumers pay more and more attention to the shopping experience of consumer terminals, which is also the key reason why e-commerce is not as good as traditional retail enterprises. Therefore, neither the traditional offline retail operation mode nor the single e-commerce mode is suitable for the future development of retail industry, and a new retail mode combining online and offline arises at the historic moment. In the new retail mode, retail enterprises no longer play a single role of earning intermediate profits, but expand the extension of goods and services, using new technologies, new logistics and new finance to create brand-new online and offline shopping scenes to provide customers with a more comprehensive shopping experience.

3 Current Situation of the Application of Smart Retail Mode in Suning 3.1 Brief Introduction of Suning Established in 1990, Suning is the first home appliance chain enterprise listed on IPO in China. It was renamed “Suning Yunshang Group Co., Ltd.” in 2013 and renamed “Suning.com Co” again in 2018 in line with the online APP strategy. Suning continues to promote its smart retail strategy, which insists on full category management, full channel operation and global expansion to realize a ubiquitous one-stop service experience [2]. Suning has pushed forward the construction of smart marketing projects around “more accurate service” and created a new marketing mechanism that is shared, open, “online, automated and smart”. Successfully completed the research and development of basic functions of the project, built a basic framework for smart marketing, and supported the design, deployment, overall planning, implementation and evaluation of marketing strategies matching the four elements of “customer-product-event-contact”. At the same time, the introduction of streaming data technology has greatly improved the response speed of marketing, and the change of production funds triggers the marketing function. By the end of 2018, Suning had more than 10,000 self-operated innovative Internet stores and outlets. Suning has entered the top three in China’s B2C market through selfoperated, open and cross-platform operations, leading the growth rate among mainstream e-commerce [3].

62

J. Zhai

3.2 Current Situation of Application of Smart Retail Mode in Suning (1) Smart retail strategy and selection background The overall development of Suning has been at the leading level in the home appliance retail industry since its establishment in 1990 until Suning.com went online in 2009, but its growth has plummeted (Table 1 and Fig. 1). Table 1. Suning’s business background 2019-09 2019-06 2019-03 2018-12 2018-09 2018-06 Profit margin on total assets (%)

5.01

0.95

0.05

6.34

2.95

3.17

Profit margin of main business (%)

14.34

13.65

15.61

14.63

14.34

14.07

Net profit margin of total assets (%)

5.40

1.00

0.05

7.09

3.23

3.38

Cost and expense profit rate (%)

8.47

1.48

0.10

5.77

3.52

5.43

Fig. 1. Suning’s business background from 2018 to 2019

From Suning’s financial indicators, it can be seen that Suning’s total asset profit rate, total asset net profit rate and cost profit rate decreased from February to March 2019 and increased after June. In order to adapt to the background of the Internet era and keep up with the changing consumption patterns of customers, Suning started the

Application of Smart Retail Mode in Suning.Com

63

O2O strategy in 2013, emphasizing that Internet retail is the main body to open online e-commerce platforms and offline physical stores to provide consumers with a full range of shopping experiences. In 2017, Suning further upgraded its six-year O2O strategy to an smart retail mode, fully integrate online and offline resources, realize the integration of information technology and physical stores, and enter a new era of smart retail mode. Smart retail mode refers to perceiving customers’ consumption habits through Internet of Things technology and providing personalized products or services for customers [4]. The smart retail mode is another innovation of Suning’s ten-year development strategy of “technological transformation and smart service”. The wisdom of smart retail is mainly reflected in: smart retail provides services to consumers by sensing their consumption habits, realizes retail big data traction, and smart retail uses socialized customer service to realize personalized service and accurate marketing. (2) Smart retail system On the basis of O2O operation strategy, Suning’s smart retail system can be summarized as “Two Major, One Small and Multi-specialization”. “Two Major” refers to the entrance that uses Suning Square and Suning.com Square to create consumption scenes and carry retail technology applications and user experiences. “One Small” refers to connecting Suning’s small shop to complete the last kilometer distance between the goods and the consumers’ hands, and implanting Suning’s products into the offline markets around the consumers. “Multi-specialization” refers to Suning’s franchise stores. Suning makes the consumption scene complete and dense through the smart retail layout of “Two Major, One Small and Multi-specialization”, thus meeting the different consumption needs of consumers at any time and space. Suning uses SMRAT smart marketing strategy to lay out and implement smart retail system. SMART marketing strategy represents the marketing strategy of S (scene), M (media), A (data), R (user) and T (industry chain) chain. Suning, with the help of O2O operation strategy, integrates all scenes online and offline, and relies on all media forms to obtain all data of consumers, thus covering the whole population, opening up the industrial chain, and achieving the effect of maximum integration of resources, as shown in Fig. 2.

Fig. 2. Suning smart retail system

64

J. Zhai

4 Problems in the Application of Smart Retail Mode in Suning 4.1 The Level of Using Network Marketing Tools is not High The level of Suning’s online marketing needs to be improved in two aspects: First, Suning does not attach importance to consumer satisfaction management. Suning carries out community integration and dissemination through online marketing methods such as fan interaction, prize-winning sign-in and promotion tools, but the actual operation result is that Suning integral mall BBS has more complaints about after-sales service, Suning has not responded to consumer complaints, and users are prohibited from giving business reviews on the review system. Second, Suning’s use of online marketing tools to improve the level of customer traffic needs to be improved. However, in fact PPTV did not achieve the expected results. Suning did not convert users on PPTV into product sales by means of drainage and product trial, thus divesting this loss-making business. 4.2 Cost Pressure is Difficult to Relieve Suning is facing the problem of high operating costs in the process of applying smart retail mode. In recent years, the state has issued a series of tax and fee reform policies, which have greatly reduced the operating costs of the retail industry [5, 6]. However, at the same time, with the rise of prices, the labor costs, logistics costs, financing costs and rental costs in Suning’s operations are continuously rising. According to statistics, in 2016, the labor cost of retail enterprises above designated size in our country increased by 4%, while the management cost and financial cost increased by 2%. The retail industry was struggling and could not afford enough funds to carry out the transformation and upgrading of new retail. 4.3 Online Platforms and Offline Physical Stores Form a Zero-Sum Game Suning’s starting point for operating O2O strategy is to integrate e-commerce platform and physical stores, thus improving profitability. From the actual operation, it can be seen that the actual operation result is that e-commerce channels obviously divert customers from physical stores, and the proportion of online business in the total operating performance rose from 31.87% in the same period to 45.02%. Due to Suning’s active competitive strategy, online gross profit margin remains at a relatively low level. The rapid growth of online sales led to a year-on-year decline in overall gross profit margin.

5 Improve the Application Strategy of Smart Retail Mode in Suning 5.1 The Application of Digital Technology has Provided Consumers with a Smart Retail Experience Smart retail requires high technology. Smart technologies such as automation, intelligence and digitalization have created a brand-new Suning full-scene retail. In addition to the integration of online and offline development, Suning is also continuously committed

Application of Smart Retail Mode in Suning.Com

65

to transforming and reshaping consumption scenes with smart technologies to improve consumers’ shopping experience. As smart retail is a subversive change to traditional retail, Suning has realized the digitalization of retail scenes and the intellectualization of retail operations with the help of various digital technologies, such as big data and AI. Take Suning Store as an example. Its 24-h store not only has its own self-service cash register system, passenger flow analysis system, but also smart customer service system. In addition, the smart mechanical arm of Suning Store can sell cold drinks, coffee and packed meals in the form of self-service [7]. Suning Store can also realize the face swiping payment method of unmanned stores. Today, Suning Smart Retail perfectly adapts to the retail demand of CBD, large communities, office buildings and other large passenger flows, providing consumers with more high-quality and smart smart retail experiences. Suning focuses on the development of smart retail through online and offline channels, based on the application of more than 80 business engines and leading technologies such as cloud technology and big data. Suning Smart Home System integrates more than 100 brands and more than 5,000 smart home products. Consumers can also control through Suning Smart APP and Smart Speaker to form a set of interconnected whole-house smart solutions to create personalized smart families. In smart families, consumers can use home products according to their own preferences, making life full of personal colors and satisfying consumers’ smart retail experience. 5.2 Reconstruct the Formation Mechanism of Online and Offline Prices Starting from the viewpoint of market competition, the new price theory holds that the online price of the same product should be lower than its offline price in order to compete with competitors. In order to prevent the online channels from distributing the performance of offline stores due to price differences, on the one hand, it is possible to provide products specially earmarked for online funds, so that there are differences in product categories between online platforms and offline sales, which have different product modes but similar product functions; On the other hand, the biggest advantage of offline physical stores is to provide perfect customer experience service. Suning should improve the function of physical stores through good customer service from the perspective of meeting customers’ shopping needs, and attract customers to physical stores for product experience and consumption [8]. 5.3 Integration of Online and Offline to Promote the Development of Smart Retail The integration of online and offline development is not only a response to the call of national policies, but also a realistic need for enterprise development. Online and offline consumption experiences are quite different and complementary. As consumers pay more and more attention to shopping experiences, Suning attaches great importance to the integration and development of online and offline retail formats. The integration of online e-commerce and offline entities is no longer a new concept. Breaking through the concept of online and offline is the trend to push forward the development of retail industry. The main connotation of online and offline dual-channel operation in the retail

66

J. Zhai

industry under the “new retail” is to be responsible for guiding traffic and placing orders online and for experience and consumption offline [9]. With the continuous maturity and development of information technology, there will be a large number of artificial intelligence to replace the original human resources, which can not only save costs to a great extent, but also improve work efficiency. It is also an inevitable path for the development and progress of e-commerce platforms to continuously promote the form of smart retail and gradually replace the existing retail form with smart retail and unmanned retail. Diversified retail forms will become the common mode of future retail. This new retail form can effectively improve the retail efficiency of e-commerce platforms. No matter Suning’s “Two Major, One Small and Multi-specialization” smart retail format group, it continuously creates a consumption environment and space across online and offline scenes. The smart retail mode of “One Body, Two Wings, Three Clouds and Four Ends” is also to better integrate online and offline with the aim of achieving full coverage of sales channels. Therefore, in order to develop smart retail, it is very important to integrate online and offline development, and it is also a link that retail enterprises should pay most attention to.

6 Conclusion In the new retail era, traditional retail enterprises need to adjust their business philosophy. Only by combining online and offline can they gain a firm foothold in the highly competitive market. Suning accurately grasped the new situation of e-commerce development in its business process. A full-scene intelligent retail ecosystem has been constructed through taking consumers as the core, accurately positioning target consumers, accessing traffic to enhance competitiveness, and opening up social and community retail. It realizes full coverage from online to offline and from cities to villages and towns, and sets up a smart retail scene that can be seen and touched at any time for users. It meets the needs at any time, any place and any service, provides consumers with a better shopping experience, and further promotes the steady development of traditional retail and e-commerce.

References 1. Pantano, E., Priporas, C.-V.: Managing consumers dynamics within the emerging smart retail settings: Introduction to the special issue. Technol. Forecast. Soc. Change 124, 225–227 (2017) 2. Hammond, R.: Smart retail: how to turn your store into a sales phenomenon. Diplomasi Revolusi (05), 78–86 (2013) 3. Vazquez, D., Dennis, C.: Understanding the effect of smart retail brand – consumer communications via mobile instant messaging. Comput. Hum. Behav. 77, 425–436 (2017) 4. Wu, X.: Practice and reflection on the comprehensive practice course of “entity operation”. Henan Educ. (Vocat. Adult Educ.) (12), 20–29 (2019) 5. Chen, Y.: Chairman of BOE (BOE): harmony and symbiosis, empowering scenes. Tsinghua Manag. Rev. (12): 23–27 (2019) 6. Li, Z.: Opening and enabling, Suning retail cloud brings new consumption vitality to sinking market. Electr. Appliance (12), 18–20 (2019)

Application of Smart Retail Mode in Suning.Com

67

7. Sun, W.: Suning’s full scene smart retail will continue to grow in six directions. Chin. Foreign Manag. (12), 62–63 (2019) 8. Qiu, Q.: 2019 Smart Retail TOP100. Internet Wkly. (22), 32–35 (2019) 9. Zhang, X., Han, Y.: Research on the energy distribution and tendency of blockchain in the E-commerce field. Int. J. Front. Eng. Technol. 1(1), 88–97 (2019)

Construction and Development of High-Tech Smart City Quan Liu(B) Guangzhou College of Commerce, Guangzhou, Guangdong, China [email protected]

Abstract. Information technology is becoming more and more mature, and the construction of smart cities can achieve accurate economic and social development. Modern electronic information technology, represented by Internet of things technology, is the key force and core technology for building smart cities. This paper firstly studies the characteristics and connotation of smart cities, and then draws the main characteristics of smart city development. Then it focuses on the IoT from the aspects of architecture, transportation, tourism, and medical care briefly analyze the technology in building smart cities. Keywords: Construction · Development · High-tech smart city

1 Introduction The development of intelligent city construction is in full swing in our country at present stage, especially in the rapid growth of social economy, there will be more and more people crowded into cities, thus strengthen the represented by the IoT application and innovation of modern electronic information technology, to become the top priority of construction wisdom city [1]. Unlike agricultural and industrial societies, human beings mainly produce smart products in a smart society. Human physical and mental power will be liberated greatly, innovative thinking and emotions will become the main aspect of human values, and human beings are moving towards the realm of “freedom”. Because cities are the main homes of modern human society. Therefore, smart cities have become the main carrier of smart civilization and have far-reaching strategic significance [2]. Smart city is a further extension of the digital city [3]. Use big data, cloud computing, IoT, optical network and other technology to restructure and optimize the core system of urban operation. With the continuous acceleration of the global informatization process, governments and related organizations around the world have issued grand plans [4]. Today, more than 100 cities in the world are vigorously promoting the practice and exploration of smart cities. The Chinese government has also kept up with the pace and actively promulgated relevant policies [5]. This paper firstly studies the characteristics and connotation of smart cities, and then draws the main characteristics of smart city development. Then it focuses on the IoT from the aspects of architecture, transportation, tourism, and medical care briefly analyze the technology in building smart cities. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 68–73, 2021. https://doi.org/10.1007/978-3-030-62746-1_10

Construction and Development of High-Tech Smart City

69

2 Construct the Framework and Characteristics of Smart City 2.1 Build the Architecture of Smart Cities Smart city refers to the application of modern information and communication technology and other scientific and technological means in urban construction to enable the city to operate, construct, innovate and make decisions more intelligently, to maximize urban operation benefits and achieve sustainable development. Smart city is to change the interaction mode of various resources in the city through the application of information technology, such as IoT, cloud computing and big data, and make rapid and intelligent responses to various demands of urban traffic, people’s livelihood, environmental protection and security, so as to improve the efficiency of urban operation, as shown in Fig. 1. It is field of future urban form and the development of various countries [6]. Video surveillance sharing

New smart city: brain

New smart city: eye

City Light Network New smart city: blood vessel

New smart city

City operation management center

New smart city: heart Big data sharing and exchange platform New smart city: blood

Internet of things Big data in cities

Public service Family services Personal service

New smart city: nervous system

Vertical industry

Fig. 1. Operation concept map of new smart city

Network information technology is the supporting foundation of smart cities. On this basis, various types of application software for smart cities have been developed, mainly including three major areas: industry, people’s livelihood and management. As a leading development area, network information technology has a direct impact on the smart city construction process. The smart infrastructure and public services related to the people’s life and consumption in a smart city are collectively called smart people’s livelihood. Smart shopping, smart transportation and other fields are directly close to the mass consumer market. Therefore, development is rapid. 2.2 Main Features of Smart City Construction IBM believes that smart cities have three main characteristics, namely perception, interconnection and intelligence [7]. It can also be summarized as fully interconnected,

70

Q. Liu

thorough perception, extensive integration, collaborative operation, incentive innovation and intelligent services. However, the construction of a smart city mainly includes the following four characteristics [8]: (1) Broadband economy Broadband economy is the foundation of smart city construction. Broadband networks provide opportunities for small, remote cities to move to economic centers. (2) Knowledge labor The knowledge economy’s rapid development can promote the progress of constructing smart city, and knowledge labor is the core factor to promote the knowledge economy’s rapid development. (3) Broad integration Smart cities are closely related to frequent human activities, constructing a sound and perfect institutional system for people’s lives and production. In addition, make full use of the physical digital infrastructure to achieve the deep integration and high utilization of urban social, economic, living, cultural and other social information and environment, resources, water quality, transportation and other physical information. (4) Cooperative operation Collaborative operation closely connects and cooperates with each other and runs in an orderly and relaxed manner. 2.3 Overview of Smart City Construction Since the beginning of this century, especially in the past 10 years, a new technology has been continuously developed, laying the hardware foundation for smart cities [9]. Many countries develop network information technology and take the lead in developing smart cities firstly. Many leading companies using network information technology have been formed in Silicon Valley, such as Microsoft, Apple, and Google. United States and Japan have become examples of smart cities. China plays a great importance role in the construction of network information technology in smart cities, and network technology companies have emerged in Beijing, Hangzhou, Shenzhen and other places, such as BAT, Huawei, ZTE, Inspur, etc. [10]. The Central City Working Conference was held during the Central Economic Working Conference at the end of 2015, which further clarified the need to build a new city. Because green cities can be achieved through the path of smart cities, human cities are the crystallization of human wisdom and must be demonstrated.

Construction and Development of High-Tech Smart City

71

After years of practice, great progress has been made in building smart cities in some parts of China, with pilot cities such as Nanjing, Hangzhou, Yinchuan, and Guiyang leading the way. In general, the construction of smart cities in China is still in its infancy, and the development level is uneven [11].

3 Application of Iot Technology in Smart City (1) Smart building When we construct smart cities, the IoT is the key technologies. To put it simply, the Internet has created the IoT under the combination of communication networks, so its application has also become an extension and extension of the Internet. Figure 2 is a conceptual diagram of the IoT technology. Devices with sensing capabilities can be responsible for sensing and identifying various types of information in the physical world, and through the interactive transmission function with the Internet, can make information and docking between people and things smoothly, to complete the connection [12]. Under the IoT technology, they can store and calculate massive amounts of data information in a more intelligent way, so that whether it is production technology, cultural life, or other aspects of the city, it can be more intelligent, thereby promoting sustainable development of the city.

National Public Safety IoT Platform Personnel monitoring

Facility Inspection

Urban Rail Station Safety Inspection

Public Safety Testing Network Provincial Public Safety IoT Platform

Dangerous Goods Detection

Personnel monitoring

Facility Inspection

3G mobile network

Municipal Public Safety Internet of Things Platform

Urban Rail Station Safety Inspection

Dangerous Goods Detection Perception layer

Network layer

Fig. 2. IoT technology

Application layer

72

Q. Liu

(2) Smart transportation Smart transportation refers to the use of the IoT technology to integrate various vehicles into a unified network, so that people and vehicles can establish perception and interaction in a unified transportation network, thereby effectively improving transportation efficiency, ensuring service levels, and achieving maximize resource benefits. Take smart parking lot as an example. By installing monitoring probes in the parking lot, and using sensing technology and mobile Internet technology to connect it to the main control room, a comprehensive monitoring of the parking lot is achieved. Monitoring equipment in parking will transmit and exchange data with the toll collection system and property management system to achieve effective resource sharing and improve the effectiveness of transportation management. (3) Smart Medical With the IoT to establish personal health records including all changes in the body from birth to death, and further expand the scope of sharing medical and health information resources. Therefore, when the patient is admitted to hospital, the doctor can quickly understand the patient’s condition in a short time, and improve the efficiency and accuracy of diagnosis. Remoting rescue, installing monitoring equipment in the ambulance by using IoT can help emergency personnel collect various vital signs information of patients. After that, the information is directly transmitted to the emergency command center or hospital emergency center through the CDMA network, to win precious treatment time for patients and improve their survival rate. IoT can also be used to establish public health systems including medical devices and drug information in smart cities. By optimizing and integrating medical information resources and actively sharing them, the government can make relevant decisions at the fastest speed based on various medical emergencies, such as infectious diseases, and save precious time, as shown in Fig. 3.

Patient

Wearable device

Third party Smart Medical

Medical equipment

Medical information Mobile Medical APP Medical

Fig. 3. Smart healthcare

Telemedicine

Construction and Development of High-Tech Smart City

73

4 Conclusion With the advent of the information age, the importance of combining urban construction with IoT technology becomes more and more obvious. Facts have proved that smart buildings and smart cities can indeed provide convenience in many aspects by using IoT. When it comes to promoting smart cities, it is also necessary to implement a perfect combination with IoT technology, Internet technology, and other aspects in medical care, education, and housing. Further, promote the wisdom and intelligence of urban construction, strive to create a harmonious and comfortable living environment for urban residents, and truly achieve sustainable urban development.

References 1. Jiang, D.: The construction of smart city information system based on the Internet of Things and cloud computing. Comput. Commun. 150, 158–166 (2020) 2. Ivanyi, T., Biro-Szigeti, S.: SMART CITY: an overview of the functions of city marketing mobile applications. Perspect. Innov. Econ. Bus. 18(1), 44–57 (2018) 3. Naranjo, P.G.V., Pooranian, Z., Shojafar, M., et al.: FOCAN: a fog-supported smart city network architecture for management of applications in the Internet of Everything environments. J. Parallel Distrib. Comput. 132, 274–283 (2019) 4. Komninos, N., Bratsas, C., Kakderi, C., et al.: Smart city ontologies: improving the effectiveness of smart city applications. J. Smart Cities 1(1), 31–46 (2019) 5. Li, D., Deng, L., Gupta, B.B., et al.: A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf. Sci. 479, 432–447 (2019) 6. Dai, C., Liu, X., Lai, J., et al.: Human behavior deep recognition architecture for smart city applications in the 5G environment. IEEE Netw. 33(5), 206–211 (2019) 7. De Falco, S., Angelidou, M., Addie, J.P.D.: From the “smart city” to the “smart metropolis”? Building resilience in the urban periphery. Eur. Urban Reg. Stud. 26(2), 205–223 (2019) 8. Dameri, R.P., Benevolo, C., Veglianti, E., et al.: Understanding smart cities as a glocal strategy: a comparison between Italy and China. Technol. Forecast. Soc. Change 142, 26–41 (2019) 9. Ismagilova, E., Hughes, L., Dwivedi, Y.K., et al.: Smart cities: advances in research—an information systems perspective. Int. J. Inf. Manage. 47, 88–100 (2019) 10. Chen, M., Gong, Y., Lu, D., et al.: Build a people-oriented urbanization: China’s new-type urbanization dream and Anhui model. Land Use Policy 80, 1–9 (2019) 11. Yigitcanlar, T., Foth, M., Kamruzzaman, M.: Towards post-anthropocentric cities: reconceptualizing smart cities to evade urban ecocide. J. Urban Technol. 26(2), 147–152 (2019) 12. Liu, Y., Yang, C., Jiang, L., et al.: Intelligent edge computing for IoT-based energy management in smart cities. IEEE Netw. 33(2), 111–117 (2019)

Design and Implementation of Self-service Tourism Management Information System Based on B/S Architecture Yue Meng, Jing Pu, and Wenkuan Chen(B) Sichuan Agricultural University, Chengdu, China [email protected]

Abstract. Tourism informationization is a trend in today’s society. Tourists are no longer satisfied with traveling with tourist groups, but hope to experience their own journey in the form of self-help. Aiming at this demand, this paper develops a selfservice tourism management information system based on the B/S structure, using object-oriented analysis and design. Through the self-service tourism management information system designed in this article, it is convenient for tourists who want to travel on their own, so that they can determine all related matters of tourism through the system, and improve the management level of tourism. Keywords: B/S architecture · Self-help tourism · Information system

1 Introduction With the increase of per capita income, tourism consumption has become a popular leisure and entertainment method. With the maturity of computer science, most tourism companies still adopt the traditional manual data management method, and the disadvantages of its management model are increasingly apparent [1, 2]. First of all, the tourism industry is a multi-industry industry involving “food, food, housing, travel, tourism, shopping, and entertainment” [3]. Due to the unreasonable scheduling of tourism resources by traditional tourism management methods, a lot of costs are spent on labor. The second is insufficient protection of customer personal data, and a large amount of information leakage has occurred [4]. Thirdly, it is impossible to deal with the needs of tourists in a timely manner, and the lack of a unified evaluation standard for the quality of tourism services is not conducive to the improvement of the tourism industry [5]. Fourth, due to the asymmetry of travel information, many travel agencies are unfamiliar with modern travel management information systems and are unable to promote the company’s business through the Internet, resulting in the loss of a large number of customers [6]. Travel agencies want to make great progress in the fierce tourism market, they must use modern technology to improve their service levels. Compared with traditional methods such as the use of electronic documents and forms such as WORLD and EXCEL © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 74–81, 2021. https://doi.org/10.1007/978-3-030-62746-1_11

Design and Implementation of Self-service Tourism Management Information System

75

for tourism information management, the application of a tourism information management system enables tourism managers to achieve economic benefits. In addition, tourism activities are affected by a variety of natural, economic, political, and cultural factors. Therefore, how to make tourists understand relevant information about tourism destinations in a short period of time is also the key to the success of travel agencies.

2 Feasibility Analysis 2.1 Demand Analysis As more and more people travel, the number of travel agencies is also increasing year by year [7]. These travel agencies arrange various tourism services for tourists and solve a series of problems during the journey of tourists. Travel agencies often contact industries such as accommodation, catering, and transportation to serve tourists together. However, this one-stop service does not satisfy all tourists. Some people prefer to travel freely and enjoy themselves. They generally learn about some travel information through friends’ introduction and recommendations, or through the Internet, and then rely on their own travel experience to travel together. However, whether it is a travel agency or individual tourism, the acquisition of tourism information is crucial. The success of a tourism is directly related to the acquisition of tourism information. The amount of tourist information includes information on tourist attractions, historical and cultural backgrounds of tourist attractions, traffic conditions around tourist attractions, accommodations around tourist attractions, eating conditions around tourist attractions, local customs and conditions around tourist attractions, and precautions for tourist attractions. Travel agencies often have most of the travel information, but individuals have very few. This has led to unsatisfactory travel experiences brought by personal travel. To solve this problem, many tourist attractions have developed their own online platforms for tourists to browse. In order to facilitate the search of tourists, a tourist information system has been created, which integrates information of multiple tourist attractions and is a comprehensive tourist information management platform. 2.2 Technical Analysis The self-service tourism management information system is designed as a management information system based on the B/S structure. Users can log in to the management information system on any host that has a browser and is connected to the Internet. All the operations of the system are completed by the server, and the client is used to display the results calculated by the server. Such a structure facilitates the operation and use of the user, and saves the cost of the client, so that the client only needs a low-configured machine to complete the system’s functions, and this approach eliminates the possibility of the client to modify the data, which improves the system security. Since all data is calculated on the server side, the performance requirements of the server are relatively high. Only the server has enough computing power to be able to process all the clients’ requests at once, and when the server fails, all clients of the system cannot continue to use it.

76

Y. Meng et al.

The B/S framework also facilitates system maintenance. When a system fails, the administrator only needs to resolve the server’s failure to enable the system to run again. At present, there are many ways to alleviate the problem of excessive computing pressure on the server. Establishing a distributed system is one of the solutions: the server is not just a host, but multiple hosts cooperate to divide the work, and finally summarize their respective work. Process to get the final result. This way, when one host crashes, the other hosts can continue to work, which improves the robustness of the system to a certain extent and makes the system more fault-tolerant. But everything has its shortcomings [8]. This distributed method must solve the problem of cooperative work between different hosts, and must determine the sequence of data processing to ensure the accuracy of the calculation results. For the self-service travel management information system, since the number of customers operating simultaneously is not large, and the current hardware level server can fully cope with the simultaneous access of more than one thousand customers, the topology structure of the self-service travel management information system with B/S structure is shown in Fig. 1 [9].

Server

Wireless

Router

Firewall

User A

User B

User C

User N

Fig. 1. System network topology [9]

2.3 Operational Analysis In the Internet era, most network users generally have a certain network operation knowledge and can operate the functions independently. The management personnel of this system need a certain professional knowledge background, which shows that this tourism management information system has certain operability.

3 System Design 3.1 System Module Design What is more important in designing a management information system is its logical structure. According to the previous needs analysis of the system, the logical structure

Design and Implementation of Self-service Tourism Management Information System

77

framework of the self-service tourism management information system can be obtained [10]. The self-service travel management information system is designed in seven logical blocks, as shown in Fig. 2.

Self-service travel management information system

Member Manage ment

Attracti ons Manage ment

Order manage ment

System Manage ment

Ticket manage ment

Custom er Reviews

Travel services

Fig. 2. System module diagram

Member management module: The member management module mainly completes the related functions of system user management. Member management mainly includes functions such as registration of member users, maintenance of member information, and recharge of member balances. The maintenance of member users is established on the premise of registration of member information: after the user completes registration, relevant information of the user is stored in the system database, and the user can modify this part of the information at any time. This information affects the functions users’ use of the system. Attractions management module: The attractions management module mainly implements the functions of attractions in the system, including the addition and modification of attractions, the maintenance of attractions information, the maintenance of tourist routes, and so on. In addition to the introduction of the attraction, the information of the attraction also includes the comment of the attraction and the tourist route. After viewing the attraction information, the user can see the introduction of the attraction, user reviews of the attraction, and recommended travel routes. Ticket management module: The ticket management module mainly implements ticket-related functions. Including the addition and deletion of tickets, purchase of tickets and so on. Adding and removing tickets is a function that can only be used by administrator users, while purchasing tickets is a function for tourist users. After the administrator has set the tickets for the scenic area, the tourist users can purchase tickets for the scenic area. Order management module: The order management module mainly implements order-related functions. The order management module includes the generation of orders, the maintenance of orders, the deletion of orders, and a refund function. The user can view the details of the order by querying the order information. When the order status is paid, the user can choose to refund the ticket.

78

Y. Meng et al.

3.2 System Main Class Design In object-oriented methodology, everything is represented by objects, and classes are abstractions of objects. The design of an information system is inseparable from the design of a class. The class of the system directly reflects the main design of the system and the main connections between objects. According to the database design of the system, the conceptual design of the system can be further obtained. Guest users and system administrator users inherit from the user base class. Questions, orders, reviews, travel notes, photos, albums, etc. provide system functions for tourist users. Charging standards, tickets, question responses, customer service and other categories provide system administrator functions. Enterprises, attractions, and tourist routes all depend on scenic spots [11]. 3.3 System Database Design The database design of the system is the core part of the system design. The self-service tourism management information system based on B/S architecture is mainly the processing of data, so the design of the database will be the key content of the system. Database development on the platform not only facilitates the centralized management of system data, improves data reusability and consistency, but also facilitates the development and maintenance of system programs. The database table of the entire system includes the following parts: administrator information table, user information table, business information table, attractions information table, route information table, hotel information table, travel information table, order information table, user evaluation information table, and so on. The E-R of the main information table of the database is shown in Fig. 3.

Travels Review

Comment

Travels

User travel notes

Travels Like Picture comments

Bel ong

Likes

Problem

Question reply

Recharge record

Recharge Place an order

Reply

Order

Reply

Customer service Order Details

Tickets

User photo

Like Photos

Photo

User

Question

Contain

Enterprise

Ticket fees

Scenic album

Photo album

Service

Scenic

Contain Attractions

Fig. 3. E-R map of the attraction

Scenic charges

Charges

Attractions fees

Tour

Tourist routes

Design and Implementation of Self-service Tourism Management Information System

79

4 System Function Implementation 4.1 Front-End Function Implementation Take the main interface as an example to introduce some functions of the self-service travel management information system. There are mainly member management, attractions management, ticket management, order management, user reviews, travel services and system management. Member management module is a module for managing all users in the system, including user registration and login, user information query and so on. User registration and login are the foundation of a management information system. To use the system, the user must first log in to the system. The management of user information is a major part of system management. The user information involves various functions and services of the system, so the maintenance of user information is very important. Figure 4 shows the user login and registration interface.

Login interface

Registration interface

Self-service travel management informaƟon system

Self-service travel management informaƟon system

Login

Registered

Account

Account

Password

Password

Login

Confirm password Confirm

Cancel

Fig. 4. User login and registration interface

Attractions management is the main function of the self-service tourism management information system. The attractions management module manages all attractions in a unified manner, making it easy for users to query and purchase tickets. In the management of attractions, the system categorizes them according to the provinces where the attractions are located. Among the specific attractions, there will be introductions to the attractions, tourist route planning, and related services near the attractions. Ticket management mainly solves the problem of ticket purchase by users. Ticket management is mainly the interaction of data in the system database. After selecting a scenic spot, the user purchases tickets for the scenic spot through a ticket purchase operation. Depending on the user’s level, the system gives users different discounts on ticket purchases. Order management is a module for systematically managing all user orders. Order management mainly relies on the storage of database tables. The system reads the

80

Y. Meng et al.

database table to personally display the order information that the user wants to know. The order management module depends on other modules in the system, and its function is only to manage all user orders. In order to complete their respective functions, other modules may call the functions of the order management module. Associated with the order management module are a member management module and a ticket management module. In member management, the member’s personal information includes the member’s order information. 4.2 Back-End Function Implementation After logging in, the administrator enters the system management. Taking travel logs as an example, the administrator can add, delete, modify, view, authorize, and freeze the posts posted by members. 4.3 System Test This process is an important link in the software development process and an important link that the software must go through in the early stages of its launch. The purpose of system testing is to make the software system run with high stability and reliability. In the process, try to find and solve system vulnerabilities to ensure that the system is more complete. The key purpose of implementing the test is to ensure that when the obtained system is delivered to the user, many problems of the user can be handled. During the implementation of the system design, the key task in the later stage is to be able to effectively test and process the obtained system. Considering that testers are involved in many aspects during the implementation of the specific design of the system, it is cumbersome to ask each other about the relationship. It is difficult to obtain functional effects consistent with the actual situation by means of subjective investigation by testers themselves. Therefore, it is necessary to perform a test process by using a specific process after the implementation of each phase to eliminate many errors in the initial situation. The specific purpose of the test implementation is as follows: first, the test processing for the error performance in the program; second, the specific test arrangement for the errors that are not shown in the program for the time being; and the third is for the program Test arrangements performed within error conditions not found by testers.

5 Conclusion The tourism management information system based on the B/S architecture combines tourism management ideas with computer technology according to the current development situation and future development trends of the tourism industry. The systematic management of tourist management attractions information, hotel information, and route information makes the management of the tourism industry enter the ranks of information management, but the system still has many areas to be improved, such as the front-end interface module can be improved Some, the background data is more complete. In short, the B/S-based tourism management information system provides a simple and effective management information system to provide a reference for the development

Design and Implementation of Self-service Tourism Management Information System

81

of the tourism service industry. It is believed that the tourism industry will receive more and more attention in the near future. The impact of people’s lives will become more important.

References 1. Xiang, Y.: Set self-service sales and online customization in one of the product network marketing system construction and management research. Cluster Comput. 22(4), 8803–8809 (2019) 2. Yi, R.: Research on development status and trend of unmanned wisdom hotel system based on artificial intelligence service—take Bangwei Company as an example. Financ. Market 4(1), 36–43 (2019) 3. Lee, L.Y.S.: Hospitality industry web-based self-service technology adoption model: a crosscultural perspective. J. Hosp. Tour. Res. 40(2), 162–197 (2016) 4. Chiang, C.F., Chen, W.Y., Hsu, C.Y.: Classifying technological innovation attributes for hotels: an application of the Kano model. J. Travel Tour. Market. 36(7), 796–807 (2019) 5. Taillon, B.J., Huhmann, B.A.: Strategic consequences of self-service technology evaluations. J. Strateg. Market. 27(3), 268–279 (2019) 6. Considine, E., Cormican, K.: Self-service technology adoption: an analysis of customer to technology interactions. Procedia Comput. Sci. 100(100), 103–109 (2016) 7. Dwivedi, Y.K., Rana, N.P., Jeyaraj, A., et al.: Re-examining the unified theory of acceptance and use of technology (UTAUT): towards a revised theoretical model. Inf. Syst. Front. 21(3), 719–734 (2019) 8. Oh, H., Jeong, M., Lee, S., et al.: Attitudinal and situational determinants of self-service technology use. J. Hosp. Tour. Res. 40(2), 236–265 (2016) 9. Considine, E., Cormican, K.: The rise of the prosumer: an analysis of self-service technology adoption in a corporate context. Int. J. Inf. Syst. Project Manag. 5(2), 25–39 (2017) 10. Kairu, M.M., Rugami, M.M.: Effect of ICT deployment on the operational performance of Kenya Revenue Authority. J. Strateg. Manag. 2(1), 19–35 (2017) 11. Ko, C.H.: Exploring how hotel guests choose self-service technologies over service staff. Int. J. Organ. Innov. 9(3), 16–27 (2017)

Chinese Culture Penetration in Teaching Chinese as a Foreign Language in the Era of Mobile Internet Ying Liu(B) Shandong Vocational College of Light Industry, Zibo, Shandong, China [email protected]

Abstract. The rise of the global Chinese fever has brought opportunities for the development of teaching Chinese, and it has also challenged the teaching models and methods of teaching Chinese. At present, Internet technology has achieved certain results in the change of teaching modes, the construction of online teaching platforms, and the development of APPs on mobile devices. The flexible use of Internet technology in teaching Chinese as a second language is conducive to teachers’ improvement of teaching methods and the leading role of teachers; learners improve acquisition efficiency and use learning resources more reasonably and efficiently; and increase the reliability and validity of management and teaching evaluation; realize the modern teaching concept of taking students as the main body, teachers as the lead, and technology as the auxiliary. Keywords: Teaching Chinese · Internet technology · Utility · Penetration of Chinese culture

1 Introduction China’s foreign exchanges continue to deepen, and its international status is increasing, the world is eager to learn about China, the trend of learning Chinese has spread, and the number of students studying in China has continued to increase. How to further improve international Chinese teaching and promotion when the “Internet +” era is coming is a problem that domestic researchers and experts have been working hard to explore. At the same time, the complexity and breadth of Chinese culture has determined the need for local universities to carry out corresponding Chinese cultural infiltration in teaching Chinese. Therefore, in the context of the “Internet +” era, how to innovate the teaching model of Chinese in combination with local characteristic resources, and to infiltrate regional culture into an efficient and practical teaching system that keeps pace with the times has become a profound research topic two. The important role of Chinese cultural penetration in teaching Chinese and culture are interdependent and affect each other. Language is an important part of culture, and the two are inseparable, especially in teaching Chinese as a foreign language. Today, the combination of language teaching and cultural teaching is the new situation, new task and new task faced by the flourishing © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 82–89, 2021. https://doi.org/10.1007/978-3-030-62746-1_12

Chinese Culture Penetration in Teaching Chinese as a Foreign Language

83

development of the teaching of Chinese and the in-depth development of disciplines as China’s national strength increases [1]. Professor Liu Yan, a famous scholar in teaching Chinese, has repeatedly emphasized: “Language teaching is inseparable from cultural teaching, and language teaching itself should include the cultural content necessary for successful communication using the target language.” [2]. However, teaching Chinese is relatively for other language teaching, it is inherently special. The complexity and breadth of Chinese culture determines that local universities need to implement corresponding Chinese cultural infiltration in teaching Chinese. As far as the Chinese language is concerned, it has been passed down for thousands of years, and has a rich cultural heritage and complicated cultural content. From the perspective of the teaching object, learners in teaching Chinese are a special group. Before they came into contact with Chinese, they had formed a completely different cultural behavior and thinking mode from Chinese culture in their native language environment [3]. Therefore, it is necessary to enrich and improve the teaching content of Chinese through the penetration of Chinese culture. Cheng Shuqiu believes that the degree of adaptation of the Chinese cultural environment plays a decisive role in the successful acquisition of Chinese by foreign students [4]. While studying basic skills such as reading, writing, and translating, foreign students find entry points from Chinese culture, and truly feel the charm of Chinese culture through local dialects, diet, wedding and funeral customs, folk customs, folk beliefs, and dwellings. And the depth of Chinese, make Chinese teaching more lifelike, situational and communicative.

2 Application Status of Internet Technology in Teaching Chinese as a Second Language 2.1 Combine Online and Offline Teaching to Change the Original Teaching Mode The application of Internet technology has changed the teaching of Chinese. In the past, the teaching method of “blackboard” and the teaching of “Yitangtang” by teachers has innovated the teaching mode to a certain extent. MOOC is a large-scale Internet-based open online course. “School Online” is currently the largest MOOC platform in China [5]. It offers elementary, intermediate and ancient Chinese language business courses. Flipping the classroom means that learners use the Internet to watch videos, listen to podcasts, and read e-books before the lesson to complete the learning of knowledge by referring to relevant material information through the network. Teachers can use precious classroom time to guide students and interact with students. Interact and communicate to promote personalized learning. At present, there are education platforms in China such as micro-classroom online, flip classroom, and easy-to-know flip classroom. O2O (Online To Offline) mode combines offline Chinese teaching with the Internet, making the Internet a platform for online teaching courses for offline trading, combined with the WeChat public platform to share online resources and interacting with offline classrooms Advantages, the introduction of multiple mixed, multiple interactive modes into Chinese teaching [6].

84

Y. Liu

2.2 Network Teaching Platform to Broaden the Chinese Learning Path Use the Internet to establish a network teaching platform for teaching Chinese. Throw the olive branch of Chinese to all parts of the world. Let learners experience “real” Chinese culture in the “virtual” of the Internet [7]. Online Beiyu is a professional website that can provide online Chinese distance education and non-degree education worldwide. Learners can obtain credits and degrees through platform learning and assessment. In addition, “Easy to Learn Chinese”, “Internet Confucius Institute” and “Great Wall Chinese” are comprehensive platforms for Chinese teaching and education. Internet technologies are used to create interactive Chinese learning environments for Chinese learners in all regions of the world, providing rich and personalized learning Chinese [8]. In addition to the above-mentioned online platforms built by domestic universities or relevant national departments, there are also some Chinese language education websites operated by enterprises, such as eChineseLearning, which are currently the world’s largest online Chinese language teaching service providers. Hansheng Chinese, Huayi Chinese Online School and other institutions have launched their own online Chinese language training courses. These Chinese language learning online platforms run by individuals pay more attention to communication with each learner, and the courses and corresponding services are more targeted, providing Chinese learners with more diversified choices and broad development prospects. 2.3 Chinese Learning APP Improves Chinese Learning Efficiency In addition to the PC terminal, the development of connected mobile devices such as mobile phones and PADs is also very rapid. In recent years, various Chinese learning APPs have sprung up. Whether it is a comprehensive “Chinese skill”, “Hello Daily”, or “Hello HSK” for HSK exams, and special training on Chinese knowledge, etc., the app enables learners to start Chinese learning anytime, anywhere, with flexibility Highly-targeted and fragmented learning methods are conducive to improving the learning efficiency of learners, as shown in Table 1.

3 The Practical Value of Internet Technology in Teaching Chinese as a Foreign Language With its advantages, Internet technology can expand the breadth and depth of “teaching”, increase the initiative and efficiency of “learning”, and increase the reliability and validity of the teaching achievement test. Internet-based computer multimedia technology has provided tremendous technical support for teaching Chinese, as shown in Fig. 1. 3.1 Combining Audio-Visual and Mobilizing the Senses According to the research on memory of cognitive psychology, if information can be combined with certain situations through visual, auditory and other sensory multichannel inputs, the rate of forgetting will be greatly reduced. The development of the Internet has made it possible to create a realistic language environment across China.

Chinese Culture Penetration in Teaching Chinese as a Foreign Language

85

Table 1. Chinese learning APP statistics Name

Category

Main content

Date of initial release

Chinese Skill

Comprehensive

Vocabulary and Grammar

2014/8/3

Hello Daily

Comprehensive

Vocabulary, Reading and Listening

2015/3/27

Learn Chinese by Talking Learn

Comprehensive

Vocabulary, Reading and Writing

2015

Phoenix Chinese

Comprehensive

Vocabulary, Dialogue, 2016/8/23 Speech, Writing

Hello HSK

HSK

Vocabulary, Reading, Listening, Grammar

2015/1/27

Art of Chinese

Special

Chinese Characters

2012/5/5

Upright Miles

Special

Voice (Tone, Pinyin)

2000/5/1

Skritter Chinese

Special

Chinese Character

2012/6/1

Watch repeatedly and deepen memory

Combining audiovisual and mobilizing the senses

Internet Practical Value

Improve the efficiency of inspection operations

Group training by country and language Efficient and convenient test method

Fig. 1. Practical value of Internet technology in teaching Chinese

Through Flash animations, micro-teaching videos and even movies, the text and sound of pictures can be fully mobilized to fully mobilize the learner’s sensory organs, so that learners can maximize accept and process the Chinese information learned [8]. The rich and colorful human-computer interaction method treats people as an information processing system that encodes, stores, and extracts sensory input, which is conducive to motivating students’ learning motivation and obtaining better learning results.

86

Y. Liu

3.2 Repeatedly Watch and Deepen the Memory Learners can make full use of the videos and audios of teaching Chinese on the Internet for preview and review, and can click and watch repeatedly to repeat the study of the important and difficult points in each Chinese class until it is completely completed. understanding. To learn a language point, the learner needs to go through a process of repetitive stimulation and response to achieve long-term memory processing [9]. This iterative process can also delay the psychological anxiety caused by language barriers to learners, and help learners to adapt and overcome the discomfort caused by cultural conflicts. 3.3 Achieve Group Training by Country and Language Department Whether it is group study in a Chinese university class or classroom group training, learners tend to choose partners with the same or similar mother tongue background for cooperation. Of course, this can reduce the barriers to communication at the initial stage, but when the learner’s Chinese level reaches a certain level, communicating with learners with different mother tongue backgrounds is easier to point out the other party’s errors due to negative mother tongue transfer, which is not conducive to intermediate and advanced stages [10]. Chinese learners in overseas classrooms have no choice of cooperative learning partners. Internet technology can provide learners with a wider range of choices for practice objects. Learners can interact online through various online interaction platforms, video and audio software, and other professional forums to achieve online interactions in different countries and languages. The practice of grouping is helpful for learners to develop the habit of thinking and thinking in Chinese and to speed up the progress of Chinese learning. 3.4 Improve the Efficiency of Inspection Operations The forms and contents of operations arranged through Internet technology are more diverse, novel, and closer to reality. The way teachers use internet technology to check assignments is more flexible and convenient. Teachers can rely on free online social software such as Skype, QQ, Wechat to let learners upload audio and video for submitting dialogue exercises, increase learners ‘interest in homework, and really practice elementary Chinese speaking in conjunction with students’ actual lives, and when learners record their homework, they will also promote the Chinese element to the surrounding people to a certain extent, and expand the influence of Chinese. 3.5 Efficient and Convenient Testing Methods Using the Internet technology, learners’ learning can be detected through video, timelimited electronic test papers, and answer questions. For example, for beginners, especially zero-based learners, a computer-based test of correct pronunciation is the easiest, most direct and effective way to learn phonetics. Learners can answer the exam questions after carefully watching online instructional videos and completing simulation exercises. The test is submitted and the computer judges the test results of correct pronunciation

Chinese Culture Penetration in Teaching Chinese as a Foreign Language

87

and tone level. After you answer all the questions correctly, you can proceed to the next step. This kind of test is designed to test the learner’s mastery of a specific concept. The test results are not only objective, but also fully motivate the learner’s subjective initiative.

4 Innovative Research on O2O Chinese Culture Infiltration Model The O2O culture teaching model is characterized by large amount of information, fast and real-time, which can effectively ensure that the content and form of teaching Chinese keeps pace with the times and is full of timeliness [6]. Among them, the empirical that best reflects its advancement with the times is the learning of new vocabulary on the Internet by Chinese learners [7]. Based on this, the O2O Chinese culture infiltration model designed by this project integrates offline traditional classroom teaching and extracurricular practice activities with online teaching resources, fully utilizing the interactive advantages of offline classrooms and the advantages of sharing online resources. Meet the international students’ mobile access to Chinese language and culture knowledge, and finally form an ideal teaching mode that is fragmented, personalized, and autonomous, as shown in Fig. 2.

O2O Chinese Culture Penetration Model Offline Model

Offline classroom

The modern teaching concept advocates that classroom teaching should shift from a transmission center to a dialogue center.

O2O Chinese Culture Penetration Model Online Model

Extracurricular practice activities

Upload micro-learning videos and digital courses to our school's online self-learning platform in accordance with the teaching plan.

The project team conducted several ordered extra-curricular practice activities in combination with the teaching content, and arranged members of the research group.

In addition, the cultural knowledge taught in the classroom is related to the content of the micro-learning videos, and corresponding Chinese knowledge exercises are designed.

Fig. 2. The model of O2O Chinese culture teaching

4.1 Online Model of O2O Chinese Culture Infiltration Model for Teaching Chinese The online quality courses are mainly based on this project’s own micro-courses. At the same time, the latest “Culture Tour: China” supplemented by the online digital

88

Y. Liu

culture course Unipus (the largest domestic university foreign language teaching platform in China) as the online Chinese culture learning content Blueprint [11]. Upload micro-learning videos and digital courses to our school’s online self-learning platform in accordance with the teaching plan. International students can log in to computers, mobile terminals and mobile smart devices anytime and anywhere for mobile access and fragmented learning. In addition, the cultural knowledge taught in the classroom is related to the content of the micro-learning videos, and corresponding Chinese knowledge exercises are designed. Through online self-learning, learn about relevant cultural teaching content and complete online related assignments. Encourage international students to record problems encountered during self-study, communicate with teachers and classmates online, and solve problems, or ask teachers in offline classes. Another advantage of online learning is that students can use mobile smart devices to play back teaching videos, consolidate assessments of key knowledge points, and conduct instant evaluations of classroom effects. 4.2 Off-Line Model of O2O Chinese Culture Penetration Model for Teaching Chinese The traditional teaching concept of offline classrooms believes that the classroom is the process by which teachers impart knowledge to students. In teaching Chinese, teachers instill a large amount of knowledge of Chinese into the classroom. The modern teaching concept advocates that classroom teaching should shift from a transmission center to a dialogue center. Teaching is not a process of one-way information transmission from teachers to students, but a process of information complementation and knowledge generation through the dialogue between teachers and students, students and students. Learning is not only a process of passively receiving information and strengthening and consolidating, it is also a process in which learners actively select and process external information, and actively construct internalization of information. Only in this way can the effect of learning and utilization be achieved, otherwise it will only fall into the dilemma of “dumb foreign language” [12].

5 Conclusion In the context of the global “Chinese fever”, research on the spread of Chinese language is in the ascendant. The overseas teaching of Chinese language has an important role that cannot be ignored in the spread of Chinese culture. Based on the era of “Internet +”, meet the challenges and opportunities brought by the development of the times to the spread of Chinese language and culture, promote the smooth implementation of the “Internet +” action plan, and highlight innovation, democracy, openness, freedom, interaction, sharing, and common development. Innovation, co-governance, and win-win. Infiltrate Internet thinking into the training of Chinese teachers, and improve the level of teaching practice; deeply integrate the innovations of the Internet into the field of teaching Chinese, make full use of the Internet platform and information and communication technology to upgrade the original teaching of Chinese, and improve Chinese as a foreign language Innovation in teaching. Absorb and utilize existing achievements, make continuous innovations and breakthroughs, promote the development of teaching Chinese,

Chinese Culture Penetration in Teaching Chinese as a Foreign Language

89

effectively disseminate Chinese language and culture, and increase Chinese cultural and economic output. In short, the continuous updating of new ideas and new technologies in the “Internet +” era promotes the development of teaching model research. The O2O regional culture infiltration mode uses online excellent courses O2O mode and WeChat public platform O2O mode to integrate online teaching resources with offline traditional classroom teaching and extracurricular practice activities, giving full play to the advantages of sharing online resources and offline classrooms. Interactive advantage. This research model has played an important role in quickly stimulating learners’ interest in learning Chinese, and has helped them to form a fragmented, personalized, and autonomous teaching model.

References 1. Ho, W.Y.J.: Mobility and language learning: a case study on the use of an online platform to learn Chinese as a foreign language. London Rev. Educ. 16(2), 239–249 (2018) 2. Yang, Y., Qi, T.: Research on the influence of internet on extracurricular learning and life of English major college students. Theory Pract. Lang. Stud. 7(8), 695–700 (2017) 3. Ai-qin, Q., Ping, F.: An analysis of the reasons for the prevalence of diurnal vocabulary in Chinese. J. Jiamusi Vocat. Inst. 1, 180–181 (2018) 4. Liu, C.: Exploration on Italian language teaching by “we-media” in the mobile internet era: taking “Himalaya FM” app as an example. Stud. Lit. Lang. 16(3), 68–73 (2018) 5. Le, A.S.H.: The studies of Chinese diasporas in colonial Southeast Asia: theories, concepts, and histories. China Asia 1(2), 225–263 (2019) 6. Wei, W.: The integration of mobile micro-learning with college English classroom teaching in the internet plus era. J. Jiamusi Vocat. Inst. 2(8), 236–237 (2017) 7. Ning, Z., Ling, Z., Zhenyu, T.: Academic libraries’ subject services in the mobile internet era. Libr. Work Coll. Univ. 2(2), 14–15 (2016) 8. Ye, G.A.N.: Study on college English mobile teaching based on constructivism. J. Zhejiang Univ. Sci. Technol. 1(2), 14–15 (2019) 9. Zhang, S.J., Yu, G.H.: Mobile learning model and process optimization in the era of fragmentation. Eurasia J. Math. Sci. Technol. Educ. 13(4), 3641–3652 (2017) 10. Meng, F.: New paradigm for China’s college education reform in the era of the fourth industrial revolution. J. Educ. Res. 16(3), 33–53 (2018) 11. Qiu, J.: A survey and analysis of mobile learning of local undergraduate college students. J. Lang. Teach. Res. 10(6), 1245–1250 (2019) 12. Wang, X.: Cultivating online English learner autonomy in internet plus era: a DST perspective. Stud. Lit. Lang. 13(5), 14–19 (2016)

Application and Outlook of Digital Media Technology in Smart Tourism Jing Pu(B) Sichuan Agricultural University, Chengdu, China [email protected]

Abstract. With the development of digital media technology, the concepts of a smart earth and a smart city have been gradually recognized. In recent years, smart tourism has gained much more attention. Smart tourism is the product of the continuous improvement of the tourism standard and different type of information technology. This article analyzes the information art design situation from the connotation of information art design, and establishes the research context from the connecting between information application design, media, and user experience. Moreover, the media regulates the form and content of information design. This article takes the development trend of media integration as the starting point, and determines the research ideas for cross-media integrated design. Based on the design examples, the types and components of the information art design of the digital service platform of the scenic spot are summarized and demonstrated. Keywords: Information technology · Digital media · Smart tourism

1 Introduction The tourism industry is highly integrated and highly dependent on information. The characteristics of diversified subjects, complex environments, strong mobility, and large amounts of information determine that the development of all levels of tourism activities requires information technology as a support [1]. The world-famous futurist John Naisbitt predicted in “megatrends”: in the recent decades, telecommunications in the tourism industry will lead the economic development effectively, but the organic combination among the tourism factors will grow into a more powerful strength. This technology will not only provide a broad stage for the development of the telecommunications and information technology industries, but also give the tourism industry tremendous development potential [2]. The advancement of tourism informatization, and experienced the initial stage of internal information management and simple release [3]. At this stage, Internet applications have not yet become widespread, and the construction of information sites is mainly used for internal information management [4]. After 10 years, the tourism information network began to cover and gradually popularize Internet-based application services. It can provide tourists with some basic single-event online services, such as ticket booking, booking and other services, and provide electronic payment [5]. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 90–96, 2021. https://doi.org/10.1007/978-3-030-62746-1_13

Application and Outlook of Digital Media Technology in Smart Tourism

91

However, the practical scale of system construction Small, single function, lack of interactivity. In the recent decades, the platform of tourism development integration has begun. During this period, smart terminals have become mainstream, and online travel booking, online payment, online marketing, and online services have enjoyed unprecedented growth. The original single-function service gradually became more diverse. Functional integration services change. As an advanced stage of the development of tourism informatization, smart tourism will be the general trend of the broad enhancing of tourism in the future [6]. In a word, the increasing of tourism informatization has roughly gone through four stages, namely tourism informatization, tourism digitization, tourism intelligence, and tourism intelligence. The four stages are both continuous and advancing with the times. The development stages of tourism informatization, digitization, and intelligence are mainly based on the processing and dissemination of tourism information [7]. The starting point is to enhance the operation of tourism enterprises and facilitate the management of tourism agencies. The biggest feature of smart tourism is that tourists are the center, which reflects the “people-oriented” concept, through the acquisition and effective integration of information resources, through the setting of mobile terminals, to provide tourists with timely, comprehensive, rich and convenient travel information, is a continuation of the broad enhancing of tourism technology, but also development of tourism industry advanced stage. Although the concept of tourism informatization has developed to a certain extent, and experts and scholars have made some progress in the study of smart tourism, on the whole, smart tourism is still in the exploration stage of its initial development internationally [8]. Experts and scholars are still at a shallow level in terms of theoretical research on smart tourism, elaboration of connotations, research on system architecture, and research on technical aspects of applied research [9, 10]. There is still little research on operation and management issues after the construction of smart tourism. The greatest theoretical significance of this research is to fill the research gaps in the field of operation of “smart tourism” after completion, and further enrich and develop the theory of “smart tourism”.

2 Definition of Smart Tourism: “Smart Tourism” and “Smart City” The concept of “smart tourism” is derived from the wisdom concept provided by “smart earth” and “smart city”. IBM CEO Sam Palmisano first proposed the concept of a “smart earth” in 2008. “Smart Earth” is a general term for modern high-tech with “Internet of Things” and “Internet” as the main operating carriers, and it is an active solution to many major problems facing the world today [11]. The smart earth is a highly integrated and universal methods, and this part can help us to realize organic combination of entities. Later, IBM introduced the concept of “smart city”. Simply put, smart cities are an advanced form of urban informatization, the next generation of innovation based on a knowledge society, and the full use of new generations of information technology in all walks of life in cities. Generally speaking, smart cities include public services such as smart transportation, smart education, smart healthcare, and smart power, as well as

92

J. Pu

smart tourism industries, agriculture, and finance. Among them, “smart tourism” has become an important content, which is regarded as a part of the construction of “smart cities”, which can be seen in Fig. 1. Relationship between smart tourism and social development

sustai nable

harmonious

Value

Social value

City development

Smart tourism Industrial connection

Economic gain

Fig. 1. Relationship between smart tourism and social development

In this respective, there are several steps to help building a much smarter earth and also some tourism applications. First, as a new concept of urban development, smart cities are driving the conceptual change, prompting people to break through the original single, mechanical development model, and highlighting the construction of a more intelligent tourism model; second, The practical exploration of smart city construction provides corresponding practical experience for the development path, development model, and infrastructure of smart tourism. In addition, as the tourism industry itself has a strong correlation, components of smart cities-smart transportation, smart communities, smart banks, smart cultural creative industries, etc.-can build a support platform for smart tourism. Regarding the concept of smart tourism, there is currently no unified expression. Based on the differences between smart tourism and traditional tourism, and the conclusions of our experts and scholars on the concept of smart tourism, we can draw the relevant concepts and connotations of smart tourism. On the whole, smart tourism can be understood in two levels: smart tourism in a broad sense and smart tourism in a narrow sense. In a broad sense, the so-called smart tourism refers to the ever-changing tourism needs of tourists. In all aspects and stages of the development of the tourism industry, by exerting intelligent thinking, condensing the strength of a smart team, and using smart means to continuously meet the needs of tourists, so that Achieve low-cost, high-efficiency, personalized development results. This level of smart tourism emphasizes the full development and utilization of smart thinking to help tourists achieve smart tourism goals. Smart tourism in a narrow sense is explained from a technical perspective, that is, smart tourism is to use cloud computing, the Internet of Things, big data and other technologies

Application and Outlook of Digital Media Technology in Smart Tourism

93

to publish tourism resources in real time through electronic devices such as portable smart terminals through the Internet, mobile Internet, and communication networks Information on tourism, tourism economy, tourism activities, etc., as well as tourist-related information, to help information seekers to realize proactive perception and ease of use, to adjust and arrange work and travel plans, which is important to develop tourists interact with the network in real time, and allow tourism to enter the “touch era”. In other words, smart tourism, as the result of the continuous development, is sustainable product of the tourism industry and information technology. Through the highly systematic integration of tourism resources, it can better provide services to tourists, destination residents, tourism enterprises and tourism governments. Smart tourism is not only a brand-new tourism concept, but also a brand-new tourism operation mode. In essence, smart tourism is to create a smart effect by introducing new concepts, applying new technologies, and operating new models to achieve the entire process of tourism activities, the entire process of tourism operations, and the entire chain of tourism services to create smart values.

3 Digital Media Technology in Smart Tourism 3.1 Cloud Computing and Smart Tourism Cloud computing is a virtualized resource that can be accessed anytime, anywhere on demand through the Internet, and is dynamic and easily extensible. The “cloud” in cloud computing refers to the network that provides resources. Cloud computing has the characteristics of great flexibility, agility, scalability, and low cost. According to the service content, cloud computing mainly includes three major service models: software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). According to specific deployment methods, cloud computing can be divided into three types: public, private, and hybrid cloud. The application of cloud computing in smart tourism is mainly manifested in six aspects: tourism cloud data centers, tourism industry information clouds, tourism software application clouds, tourism e-commerce clouds, cloud computing call centers, and cloud computing translation centers. The functions that tourism cloud computing can achieve are mainly divided into three levels: the tourism infrastructure service layer (T-IaaS), the tourism platform service (T-PaaS) layer, and the tourism software system service (T-SaaS) layer. The tourism infrastructure service layer (T-IaaS) can help the government and related enterprises build IT systems. In addition, it provides communication infrastructure services to facilitate related enterprises to develop tourism services. At the level of tourism software system services (T-SaaS), cloud computing provides system software services for tourists, governments and tourism enterprises. Among them, providing community-based software services for tourists, while providing a platform for mutual communication, communication, feedback, evaluation and complaints, it also includes some mobile smart terminal applications. Software service systems for governments and enterprises mainly include various internal management applications, tourism portal systems and evaluation systems, as shown in Fig. 2.

94

J. Pu Cloud computing

communication

human

Internet of thing

Bigdata

Smart earth

resource allocation

travel

connecting

Mobile

Smart tourism

Traffic free

bussiness

Smart city

Fig. 2. Schematic diagram for the role of digital media technology played in smart tourism

3.2 IoT and Smart Tourism The Internet of Things (IoT) is a kind of newly network technology. It mainly connects any items and items in the world, realizing the exchange, connection and communication of information, and can intelligently identify, locate, and track items and regulation. The Internet of Things uses a variety of sensing devices, currently mainly including global positioning systems, radio frequency identification devices (RFID), laser scanning and infrared sensors. At the same time, China’s network industry will achieve a scale of more than 500 billion yuan, with an average annual growth rate of more than 10%. The Internet of Things technology can provide tourists with “full-process” tourist information services. Before traveling, the Internet of Things can provide tourists with comprehensive information related to eating, living, traveling, travelling, shopping, and entertainment. During the tour, tourists can enjoy intelligent navigation and guide services through the positioning function of the Internet of Things. Enhance the experience. After the tour, tourists can use the web2.0 technology provided by the Internet of Things to express opinions and share feelings through the network platform, and they can also feedback or complain about related issues. For tourism enterprises, IoT technology can form a virtual resource library to help tourism enterprises realize informatization construction, and it can also analyze the behavior of tourists to help enterprises achieve accurate Internet marketing. For tourist attractions, the Internet of Things can sense the space-time location and status of tourist resources in real time, and track, locate, monitor and manage the density of people in the tourist attractions, facilitating managers to guide passenger flow and rationally control passenger flow. In a word, IoT technology can effectively integrate tourism information resources, which could help realize the resource use, and also help tourism industry management department, maintaining a good tourism order, and deal with problems in the tourism process in a timely manner. 3.3 Mobile Internet and Smart Tourism Mobile Internet, as a new type of network activity, mainly uses smart mobile terminals to obtain relevant transactions and services through mobile wireless communications. A complete mobile Internet includes three parts: terminal, software and application.

Application and Outlook of Digital Media Technology in Smart Tourism

95

Among them, the terminal mainly includes smart phones, tablet computers, mobile Internet terminals MID (Mobile Internet Devices) and so on. From 2006 to 2012, the growth rate of China’s mobile Internet market exceeded 80%. The 31st Statistical Report on Internet Development in China shows that by the end of 2013, the number of mobile Internet users in China had exceeded 618 million. After the year-on-year increase of 37.6% at the end of 2012, it increased by about 10%. China’s smart terminal market share is also rapidly increasing, and China’s mobile Internet market has a lot of room for development. The development of smart tourism has benefited from the promotion and popularization of mobile Internet and smart terminals, and “smart tourism” has changed from idea to reality. The combination of mobile Internet and smart tourism will innovate tourism applications, provide tourists with more convenient and efficient products and services, and provide a more personalized experience. Among them, Location-Based Service (LBS) is one of the breakthrough applications. LBS provides users with a valueadded service. The application platform is GIS (Geographic Information System), which is a geographic information system. The way to obtain location information is through the wireless communication network of a telecommunications operator or other external positioning methods such as GPS (Global Positioning System), which is a global positioning system. Wait. LBS has strong applicability to the tourism industry and has great advantages in terms of tourist location information and location services. LBSbased technologies and related concepts have spawned many valuable intelligent terminal applications in the tourism industry. LBS provides an effective promotion method for merchants. Merchants can sell their products to tourists through information push function, send coupons, etc. to attract tourists. For tourist attractions, the terminal information display can be used to provide tourists with timely and accurate tourist information displays, and electronic tickets for scenic spots can be issued with barcodes and QR codes printed. Tourists can also download the APP application software through the mobile client to implement scenic area navigation, preview the real scene, and enjoy a comprehensive and multi-angle tour of the scenic area. 3.4 Big Data Technology and Smart Tourism Big data is also named as large amount of data, which means that the number of data covered by internet has reached a significant level in accordance with the current mainstream software and tools. The information can’t help the business operation and decisionmaking. Big data technology is featured as the followed points, that is, volume, speed, diversity, and low value. Big data technology can’t be easily handled according to used data, but a professional processing of meaningful massive data, and find what is really valuable for decision-making. Big data is another subversive technological change in the information technology industry after cloud computing and the Internet of Things. The tourism industry generates hundreds of millions of tourists and resources, which are not only derived from external data of tourists, tourism companies and tourism industry management departments, but also from a lot of gaining tourists and places gotten from internal management of hotels and scenic spots. The data, complicated types, and low value density are in line for the improvement of the resources, which are important reasons for applying a smart tourist places. In terms of smart tourism services, through the establishment of data centers, the creation of user-end and server-side platforms,

96

J. Pu

the use of advanced analysis techniques and methods to analyze and integrate the relevant data of the tourism industry, provide scientific and effective tourism consulting for tourists, and assist tourism Decision-making can also continuously improve tourism public information services and improve tourist satisfaction.

4 Conclusion The development of smart tourism meets the needs of the development of urban informatization. On the basis of urban modernization, the functions of the city have been further extended and sublimated through new-generation information technology. The development of smart tourism involves the comprehensive operation of multiple systems. While applying smart technology to tourist attractions and related services, it should expand the scope of application in a timely manner, adaptively change the way of economic development, and promote urban public services and social management. The informatization development of the city enables cities to focus on intelligently discovering and solving problems, and has a stronger ability to innovate and develop, improve the soft power of the city, change the image of the city, and improve the quality of life of people.

References 1. Li, Y., Hu, C., Huang, C., et al.: The concept of smart tourism in the context of tourism information services. Tour. Manag. 58, 293–300 (2017) 2. Jovicic, D.Z.: From the traditional understanding of tourism destination to the smart tourism destination. Curr. Issues Tour. 22(3), 276–282 (2019) 3. Huang, C.D., Goo, J., Nam, K., et al.: Smart tourism technologies in travel planning: the role of exploration and exploitation. Inf. Manag. 54(6), 757–770 (2017) 4. Del Vecchio, P., Mele, G., Ndou, V., et al.: Creating value from social big data: implications for smart tourism destinations. Inf. Process. Manag. 54(5), 847–860 (2018) 5. Koo, C., Shin, S., Gretzel, U., et al.: Conceptualization of smart tourism destination competitiveness. Asia Pac. J. Inf. Syst. 26(4), 561–576 (2016) 6. Brandt, T., Bendler, J., Neumann, D.: Social media analytics and value creation in urban smart tourism ecosystems. Inf. Manag. 54(6), 703–713 (2017) 7. Park, J.H., Lee, C., Yoo, C., et al.: An analysis of the utilization of Facebook by local Korean governments for tourism development and the network of smart tourism ecosystem. Int. J. Inf. Manag. 36(6), 1320–1327 (2016) 8. Huang, A.: The First International Conference on Smart Tourism, Smart Cities, and Enabling Technologies (the Smart Conference), Anatolia, vol. 30, no. 3, pp. 431–433 (2019) 9. Romao, J., Neuts, B.: Territorial capital, smart tourism specialization and sustainable regional development: experiences from Europe. Habitat Int. 68, 64–74 (2017) 10. Chung, N., Tyan, I., Han, H.: Enhancing the smart tourism experience through geotag. Inf. Syst. Front. 19(4), 731–742 (2017) 11. Koo, C., Mendes Filho, L., Buhalis, D.: Smart tourism and competitive advantage for stakeholders. Tour. Rev. 74(1), 1–128 (2019)

Accounting Informationization in Computer Network Environment Shirong Qin(B) School of Accounting, Harbin University of Commerce, Harbin, China [email protected]

Abstract. With the advent of the information age, people’s lives have changed greatly, and computer networks have emerged. Although China is continuously developing and computers have been widely used, there are more and more problems, which seriously threaten Computer network security. In the computer network environment, accounting informationization is also facing new bottlenecks, so in this situation, the path of accounting informationization is constantly explored. Keywords: Computer network · Accounting information · E-Commerce

The gradual improvement of science and technology has led to the rapid development of internet technology. China has entered an ever-changing era of e-commerce, and there is nothing wrong with it that has had an important impact on traditional accounting in the past. Under the computer network environment, e-commerce has developed rapidly. This situation the characteristics of accounting informatization have gradually emerged. Only by building an enterprise-based information system on the basis of the Internet, readjusting the more important business processes in the enterprise, realizing the integration of information systems in the true sense, and effectively controlling the operation of the enterprise, only in this way can we get the top spot in the increasingly fierce market competition.

1 Characteristics of Accounting Informationization in Computer Network Environment 1.1 Paperless With the advent of the e-commerce era, the most basic feature of accounting information is paperlessness. The development of e-commerce has further promoted the networking of enterprise information systems, and the accounting information system has gradually developed in an open state. Accounting systems and other The business systems are effectively connected [1–3]. In the manual accounting environment, the most obvious feature of paper data is that the relevant business data of the company in the paper accounting

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 97–102, 2021. https://doi.org/10.1007/978-3-030-62746-1_14

98

S. Qin

account is easily left after being modified. However, e-commerce in the computer network environment is a kind of Paperless transactions, the paper-based accounting data in the past is properly saved using USB disks and hard disks as media. In addition, after the electronic data is modified, there will be no marks left, making it possible for criminals to take advantage of it. Data Security. 1.2 Openness With the continuous development of the Internet and e-commerce, accounting informatization uses advanced science and technology to realize automatic data processing and sharing of accounting information and data resources. It transfers accounting information to internal systems of enterprises through network channels, such as production departments, business departments, etc. And external systems, such as banks, prompt internal and external related systems to collect corporate information directly. In addition, other departments within the enterprise and external agencies can collect relevant information directly through the network on the basis of authorization. This also shows that under the computer network environment the accounting information is open to development [4–6]. 1.3 Diversification Faced with the increasingly diversified information needs of users, it has led to the diversified development of accounting information. Accounting information is the display of the company’s operating results, and the company’s operating results and quotas belong to accounting information users. As the primary accountant of a company the task is to provide information to users to meet their needs. Although there are great differences in user information needs at different levels, there are also many similarities. Given the different interest relationships between users who use accounting information, the need for accounting information there is also a difference, which is also the main reason for the difference. Users are diversified due to different information need, which also creates the characteristics of diversified accounting information. 1.4 Intelligent The characteristics of intelligent accounting information are mainly reflected in the automated processing of corporate accounting operations and the sharing of information and data resources, which can collect accounting information in real time and report in a timely manner, readjust the accounting model with advanced information technology, and modernize management models to the traditional Reorganize the accounting organization model and business, improve it, and use modern organization methods and management models for online office and virtual office.

Accounting Informationization in Computer Network Environment

99

2 The Impact of Computer Network Environment on Traditional Accounting 2.1 Impact on Accounting Assumptions (1) Impact on the going concern assumption Here, continuous experience usually refers to the assumption of accounting experience so that the company can develop in a certain period of time. It can effectively avoid corporate liquidation and bankruptcy. Based on the continuous development of e-commerce, accounting entities will also develop at high speed. Can’t keep up with the times and will be eliminated, it is clear that companies are no longer suitable for use. Therefore, in the computer network environment, companies use liquidation accounting methods or optimize and create accounting systems and methods need to be clear [7–9]. (2) Impact on accounting entity assumptions Accounting entities pretend to standardize corporate accounting work and implement clear regulations on the space. Under the premise of clear assets, liabilities, and the rights and interests of all personnel, they can be attributed to accounting factors above the space. However, e-commerce is temporary and not reasonable Plan the scope of the space, so in the computer network environment, the accounting entity should be redefined, and the accounting entity assumptions can also be modified. (3) Impact on currency measurement assumptions In the computer network environment, in the process of e-commerce transactions, both virtual companies and online banks no longer use banknotes for transactions, and banknotes are gradually replaced by electronic money, becoming the main form of online payment. Due to the generation of electronic money, In the daily registration of books, it indicates that the uniqueness of the currency of the measurement unit is gradually weakened, improving the operating efficiency and utilization rate of corporate and bank funds, and prompting them to complete capital decisions in a short period of time. Intangible increase in currency risk. 2.2 Impact on the Form of Accounting The so-called form of accounting is that an enterprise processes various accounts and analyzes and compares them with accounting vouchers and books, and then verifies whether the statements are in line with the actual situation, and accurately analyzes the financial situation of the enterprise. In the accounting work, manual accounting is often used, and the work is not effective. However, in the computer network environment, the accounting efficiency has been greatly improved, and the accounting form has also changed significantly. Online banking has greatly improved the settlement of funds. Efficiency, while sharing information and data resources within the enterprise, enhancing the transparency of accounting work and improving the level of financial management, in addition to reducing the workload of accounting staff [10].

100

S. Qin

2.3 Impact on Payment and Settlement Methods In the computer network environment, the settlement method has the characteristics of paperlessness, informatization and digitization, and the calculation method is more convenient and flexible. The Internet foundation, the establishment of online banking, compared with the traditional settlement methods in the past, online banking is more efficient and it is convenient and easy to operate. After completing the transaction, you can still issue the corresponding electronic voucher, which will help the accounting staff to organize the account information and improve the settlement effectiveness. Moreover, online banking is consistent with people’s needs at this stage, but if you want online banking In order to give full play to its role, it should also ensure its security and confidentiality. In addition, electronic money used in online transactions or load-bearing often has shortcomings such as insufficient funds or repeated use. Therefore, it is necessary to ensure the safety of online banking and the electronic money for normal use, a sound network system security management system and a sound economic and financial management system should be formed in order to promote the continuous optimization and update of settlement methods.

3 The Construction Strategy of Accounting Information in the Computer Network Environment 3.1 Strengthening Awareness of Cyber Security Prevention In the computer network environment, first of all, it is necessary to strengthen the safety awareness of financial personnel, strengthen the financial management of enterprises, and make relevant financial personnel aware of the importance of accounting information data and the serious consequences of leakage of accounting information. Second, the introduction of advanced science and technology Prevent potential accounting information risks within the enterprise, set up professional login accounts for financial staff’s work content, and set access to select all, effectively avoiding the use of accounting information systems by staff in other departments at will, preventing the occurrence or damage of accounting information Finally, a firewall is installed on the computer that analyzes and processes accounting information, and external systems are strictly prohibited from accessing internal corporate systems. In addition, backups of more important accounting information data are effective to avoid data loss. 3.2 Improving the Level of Accounting Operations and Computer Operation Capabilities Regardless of the nature of the enterprise, talents provide a source of power to promote its development. As far as the current situation is concerned, China’s accounting professionals are relatively scarce, and the existing accounting personnel have a low level of business, and their accounting capabilities and management capabilities are low. In addition, the computer operation ability is also poor, and the above-mentioned reasons have a certain impact on the accuracy of the accounting work, and can not provide a

Accounting Informationization in Computer Network Environment

101

reliable basis for enterprise managers to make decisions. First, improve the access standards of accountants, and at the same time Existing accountants have increased their training efforts, urged them to understand and master the latest accounting information, strengthened their computer operation capabilities, repositioned the accounting work, and cultivated the sense of ownership of accountants. Second, better create good quality for accountants. Social and school environment, and set up specialized training organizations to effectively guide the business level of accounting staff. Third, closely integrate computer networks with accounting to improve the effectiveness of accounting informationization, maximize the use of the advantages of computer networks and give full play to come out, enhance its level of accounting information processing, and rationally allocate accounting information resources. 3.3 The Establishment of Electronic Information Integration System Increase the digital management of basic information of enterprise accounting informatization, improve the knowledge level and professional skills of staff, integrate core business processes in the enterprise, and integrate modern management concepts and technologies in the management process to achieve the current e-commerce era. The demand for accounting information. As an information system where the enterprise should be centralized and decentralized from the source, it is necessary to create a central database to make full use of the transaction execution status of each subsystem in the enterprise’s accounting information system to improve and update the information in the central database in a timely manner.

4 Conclusion Computer network is the guarantee condition for enterprises to realize accounting informatization. At the same time, the reasonable allocation of accounting information resources promotes the proper coordination of various information resources within the enterprise and promotes the development of accounting informatization. Under the computer network environment, accounting informatization is important for e-commerce. Realization has played an important role, and at the same time, the financial management level of the enterprise should be improved. The financial personnel’s safety awareness can be continuously improved to improve the level of accounting personnel and operational capabilities. Establish an integrated electronic information integration system and create a central database In order to help enterprises gradually realize the informatization of accounting, improve and improve the third-party payment system, and continuously increase the market share of enterprises, so as to better promote sustainable development.

References 1. Guo, X.: Accounting informationization in computer network environment. Mod. Mark. (Inf. Edn.) (08), 60 (2019) 2. Li, Y.: Basic architecture and function realization of accounting information system based on computer network environment. Microcomput. Appl. 34(03), 77–79 (2018)

102

S. Qin

3. Dai, X.: Research on internal control of accounting computerization in computer network environment. Educ. Teach. Forum (10), 197–198 (2017) 4. Zhang, Q., Zhang, X.: Design and implementation of network accounting information system for large and medium-sized enterprises. Manag. Inf. Syst. (06) (1997) 5. Fan, X.: Discussion on the optimization of accounting information system of group companies——taking Haike Group as an example. Finan. Account. Newslett. (34) (2018) 6. Tu, W.: Problems and countermeasures of modern accounting information system management. Econ. Res. Guide (03) (2019) 7. Wang, Y.: Research on the problems and countermeasures of accounting informationization in the internet + background. Mod. Market. (Bus. Edn.) (04) (2019) 8. Cai, J.: Implementation method and process of accounting information system. Heilongjiang Sci. (07) (2019) 9. Lin, M.: Probe into the security problems of accounting information system. Account. Chin. Townsh. Enterp. (05) (2019) 10. Zhang, J.: Problems in current accounting information system and improvement measures. Chin. Foreign Entrep. (18) (2019)

Mobile Phone GPS and Sensor Technology in College Students’ Extracurricular Exercises Zhikai Cao(B) Jianghan University, Wuhan 43000, Hubei, China [email protected]

Abstract. Fainting and sudden death often occurred in college students’ Physical Fitness Test, which has worried all people in college and the whole society. The college students’ physical education and the credit system for extracurricular exercise performed practically no function. Combination with mobile Internet, mobile phone GPS and sensor technology was adopted. There were altogether 3642 students as the research objects in this experiment. Results for the students’ extracurricular exercise and physical fitness test without using mobile phone GPS and sensor technology were taken as experimental control groups. The experiment was divided into two stages. It was found that students’ enthusiasm for extracurricular exercises could be enhanced by the application of mobile phone GPS and sensor technology; mobile phone GPS and sensor technology were helpful for analyzing and optimizing the frequency and effect of students’ extracurricular exercises, and could monitor their exercise levels and scientifically improve their physical fitness. Keywords: GPS and sensor technology · Extracurricular exercise · Exercise levels monitoring

1 Introduction 1.1 Research Background At present, some colleges and universities in China have adopted measures such as morning exercises, daily running, and checking in at morning and evening, all in group. According to the results of physical fitness test, these measures have improved the physical health of college students to a certain extent However, at the meantime, there are a lot of problems: inflexible timetable, it cannot be adjusted according to personal timetable or schedule; potential safety hazard, group activities lead to greater safety hazards in various aspects such as transportation and walking; increasing the extra workload of teachers, there are tedious tasks such as organizing, supervising and performance managing, which affects Teachers’ routine teaching work; at the same time, the exercise status of students cannot be actually monitored, and students’ exercise cannot be effectively supervised [1–4]. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 103–108, 2021. https://doi.org/10.1007/978-3-030-62746-1_15

104

Z. Cao

Based on the current situation mentioned above, in consideration of differences of campus and site specificity, in order to achieve comprehensive supervision of students’ extracurricular exercise, and allow students to do their own extracurricular exercises at will, this study proposes to combine mobile Internet technology with mobile phone GPS and sensor technology, etc. In the end, students’ extracurricular exercise habits can be changed so as to achieve the ultimate goal of improving their physical fitness. 1.2 Mobile Phone GPS and Sensor Technology Almost all smart phones on the market have GPS and sensor modules. Mobile phone GPS is mainly used as positioning and navigation. A sensor is a detection device that can be used to sense the information, transform the information into electrical signals or other required forms of information in accordance with certain rules to meet the requirements for transmitting, processing, storing, displaying, recording and controlling. Based on the above two characteristics, developing a mobile program to apply it to students’ extracurricular exercises can achieve a real-time monitoring of students’ extracurricular exercises [5–8]. With the help of Internet technology, mobile phone application software can be designed to meet the expectations of the experiment. It can collect all student data after they registered and uploaded their personal information. When students participate in extracurricular exercises, they take their mobile phones, they open the APP and GPS before the exercise starts. Then, GPS will record student’s positioning and sensor will record student’s movement and determine the exercise status. After the exercise, the data will be automatically uploaded to the management platform, which is convenient for the college’s supervision and management for student’s exercise situation. Based on these data, the college displays student’s exercise situation and the score of the physical education curriculum, to provide feedback and reminders to the students who failed to reach the exercise goal. The mobile phone GPS and sensor technology can be used to preliminarily supervise students’ extracurricular exercises, display students’ exercise scores, and provide exercise data. This technology can be fully applied to college students’ extracurricular exercises through experimental comparison.

2 Experimental Methods and Steps 2.1 Experimental Methods Comparative experiment was used here: extracurricular exercise and the physical fitness test results of those who did not have access to mobile phone GPS and sensor technology were taken as the control group, while the results of those who do have access to these technologies were taken as the experimental group. The experiment was divided into two phases. At phase one, the initial trial period lasted one semester, starting from September 2018 to January 2019, during which students completed registration and achieved their extracurricular exercise goals on schedule, without other requirements. This phase was mainly aimed at testing Students’ initiative and practicability of mobile phone GPS and sensor technology. Phase two was for comprehensive testing, lasted one semester from

Mobile Phone GPS and Sensor Technology

105

March 2019 to July 2019, during which, students must complete registration and achieve their extracurricular exercise goals. This phase mainly meant to solve the problems of the first phase and fully applied the mobile phone GPS and sensor technology. The experiment targeted students enrolled in 2017 and 2018, with a total of 3,642 students, 51.3% are boys while 48.7% are girls, a little difference in the male-to-female ratio. 2.2 Experimental Step At the first phase, a set of simple mobile app for students and a simple back-stage management were adopted. Before exercising, the college uniformly set the running distance, speed requirements and time range for the one-time exercise. The students need to trigger the collection of positioning information while running. They turned on the timer to do the timekeeping. The system calculated the distance and the running speed based on the positioning and the time range. After exercising, the system automatically determined whether the running distance and speed uploaded by the students were within the required goals. It would be recorded as a verified exercise when the date met the requirements [9, 10]. Each student must achieve at least 10 verified exercises in a semester. After students continuously exercised in this way for a month, they could independently use this app and uploaded exercise data. Every day, many students ran with mobile phones, no need for being organized by teachers. Students could also decide by themselves when or where to exercise, as long as the requirements were met. This phase lasted one semester, from February 2019 to July 2019. At the second phase, the mobile app and back-stage management were further optimized. Students must register and use the required mobile phone software. The sensor electronic fence was used so that students were ensured to exercise within the safe range. Orienteering mode was adopted to prevent cheating because students’ routes were different. At the same time, sensor data analysis was applied to judge the difference between the simulator and the real person. In terms of the number and intensity of exercise, the logic of limitation of one or two verified exercises per day proved to be reasonable in order to prevent a series of operations such as overexercising and cheating that might appear at the first phase. This phase lasted one semester, starting from September 2019 to November 2019.

3 Experimental Results 3.1 Helped Improve the Participation Rate of Students’ Extracurricular Exercises The results of the experiment at the first phase were good according to experimental data. Students actively participated in extracurricular exercises. Some of them gradually developed habits of physical exercise so that it achieved the goal of extracurricular exercises. At the same time, new problems were discovered through actual investigations: in order to quickly complete the goal, some GPS deception tools were used to simulate exercising, students would exercise multiple times a day, some just went for imposters, some chose to run outside the campus, which was not safe, and so on.

106

Z. Cao

At the second phase, extracurricular exercise gradually became part of students’ lives, so that their physical qualities was really improved. Experimental data indicated that during this phase, an increasing number of students participated in running, and they became more enthusiastic about extracurricular exercises. Except for the extreme weather, there were always a lot of students exercising after class every day. Moreover, some data and information of great research value were found. For example, in terms of time, usually students run in the morning or evening. Among them, most ran at evening, accounting for more than 65%; in terms of gender, girls exercised relatively less than boys, generally 1 to 2 km, with a stable frequency of fixed times per week, while boys exercised heavier, ran quicker than girls, generally 1.5 to 3 km, lack of frequency stability. Some boys might have no verified exercise record in a week, but multiple records in the next week; some students were unwilling to exercise, they did it only for the task. However, after exercising for a period of time as required, they started to accept it, with frequency and amount of exercise obviously increasing. By comparing the results of the first and second phases of the experiment with the students’ extracurricular exercise when mobile phone GPS and sensor technology were not applied, it was found that problems of cheating and insecurity were solved with the help of the mobile Internet, mobile phone GPS and sensor technology. The experiment was important to both students and teachers, good for teachers’ supervision, testing and management of extracurricular exercises. Students exercised by themselves so that teachers had more time to be well prepared for the good lessons. Overall, this method obviously improved students’ motivation in extracurricular exercises (Fig. 1).

Fig. 1. Running participation of students with and without the technology

Students should be encouraged to do extracurricular exercises, which is an important way to enhance students’ physical fitness. With the help of mobile phone GPS and sensor technology, the number of students exercising tripled. 3.2 Effectively Monitored Students’ Exercise Levels and Instructed Students to Exercise Scientifically The figure above showed that the relationship between them is like an inverted “U” shape curve. When a student exercised very less or very more a week, his test scores were not

Mobile Phone GPS and Sensor Technology

107

Fig. 2. Relationship between the weekly running frequency and students’ physical fitness test results growth

likely to be impacted. The results of student’s physical fitness test clearly showed how their physical health could be. In terms of the frequency of extracurricular exercises, it could be found that an average of 3 to 4 effective exercises per week had the most positive effect on enhancing students’ physical health. When the frequency increased or decreased, there was less growth in students’ physical health (Fig. 2).

Fig. 3. Relationship between the weekly running distance and students’ running performance growth

It was concluded from the figure above that the relationship between them is like a “N” shape curve. When a student’s weekly running distance was less, his endurance increased slowly. When a student’s weekly running distance was around 6 km, his endurance increased the most. After 6 km, the performance tended to be stable. Therefore, college should arrange extracurricular exercises based on this conclusion: make weekly running distance a reasonable number so that students get better endurance running performance and enhanced physical qualities (Fig. 3).

4 Conclusion Judging from the experimental results, it is very practicable and reliable to apply mobile Internet, mobile phone GPS and sensor technology to extracurricular exercises. It provides a very convenient way for the actual data of students’ exercises to be collected, for objective data to be quantitatively analyzed.

108

Z. Cao

The data can be used to accurately understand and grasp students’ exercises situation, and to establish various models based on big data analysis, which are the important theoretical basis for relevant decisions and measures. Except basic running, other types of exercises can be reflected in the form of data through sensors and smart Internet of Things in the future, which will be the foundational research for the further development of students’ physical fitness monitoring.

References 1. Wang, Q.: Discussion on the approaches and significance of improving physical education efficiency under the big data background. Bull. Sport Sci. Technol. 26(1), 91–93 (2018) 2. Zhang, B., Zi, X., Zhu, X., Ting, X.: Research on the construction of university sports information platform based on smart campus. J. Zhejiang Bus. Technol. Inst. 16(2), 84–88 (2017) 3. Yang, R., Zheng, Z., Zhang, C.: Research on the effect of college students’ independent extracurricular exercise based on running app. China School Phys. Educ. 5(11), 29–32 (2018) 4. Ding, Y.: Development and implementation of physical education curriculum management under smart platform. J. Shandong Agric. Eng. Univ. 36(10), 147–148 (2019) 5. Xiao, Y.: New thoughts on college students’ physical fitness test in the era of media. Sports World (Scholarly) 01(11), 166–167 (2019) 6. Wang, H.: Research on the application of big data in the integrated management and service of higher vocational sports under the background of informatization. Sports Vis. 26(09), 215–216 (2019) 7. Li, G., Shi, L.: Research on the application of UWB-based positioning and tracking test system in middle and long distance running. China Sport Sci. Technol. 54(6), 103–108 (2018) 8. Chen, J., Qiu, K., Zhang, Y.: Construction plan of smart sports platform under the background of “Internet+”. J. Nanjing Sports Inst. 16(03), 152–130 (2017) 9. Pan, Y.: Research on data visualization of sports apps in the era of big data. Phys. Educ. Rev. 37(03), 24–39 (2018) 10. Chen, L., She, Z.: The impact of smart phone exercise software on college students’ running performance, exercise attitude and behavioral habits——based on the 18-month use of “joy running circle”. J. Hanshan Normal Univ. 40(03), 66–74 (2019)

Design of Networking Network Model Based on Network Function Virtualization Technology Jin Bao(B) Zhaotong College, Zhaotong 657000, China [email protected]

Abstract. With the development of society, the living standards of our people have been continuously improved. More and more people are changing from walking to driving. China’s auto sales are also increasing year by year. The purpose of this article is to design a networking model for the Internet of Vehicles based on network function virtualization technology. In terms of method, this paper mainly designs the preliminary structure of the model, and proposes to improve it under the PON technology, and uses the PON system, which is mainly composed of optical line terminal (OLT), optical distribution network (ODN), and optical network unit (ONU) composition. This paper proposes the design of FTTH networking mode based on EPON technology. Since FTTH requires a large number of splitters and PON ports, the splitter method is used in computer rooms or optical intersections. In terms of experiments, the validity of the FTTH networking model proposed in this paper is mainly verified. By comparing the pass rate of the four subjects of the driver’s license with those of the driver’s license, it is found that the pass rate of the vehicle-connected FTTH networking mode is higher than that of the driver’s license, and exceeds 96%. Keywords: Internet of Things mode · Internet of vehicles technology · Virtualization technology · PON technology

1 Introduction Car + network is an application that belongs to the network. With the development of society, more and more cars enter our lives. A huge market base and people’s needs have emerged. According to relevant data, the total number of vehicles worldwide has reached 1.4 billion in recent years. According to incomplete data statistics, more than 86% of them are light vehicles, and they are shown through annual data analysis in 2050. With the emergence of more than 200 million cars, the development of the times is the improvement of people’s living standards, which is the basis for building a huge automobile market. With the increase of cars, the development of the Internet has become more and more common. In a way, it has many facilitation effects on world traffic order, and it is mainly reflected in applications such as on-board electronic sensor devices. This can effectively promote the modernization of information exchange processes between cars, © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 109–114, 2021. https://doi.org/10.1007/978-3-030-62746-1_16

110

J. Bao

roads, cities and people. Further trends in the automotive and information technology industries will evolve towards networks and intelligence. He is fundamentally different from traditional transportation systems. Reasonable application of the car’s Internet connection provides a smarter and safer driving environment for better users. In-vehicle social networks are the development direction of automotive networks, and with the understanding of modern cars, many cars have an entertainment environment. In this way, cars and owners become more interactive. You can also install a satellite navigation system on the display, play videos and view vehicle safety monitoring data. By applying it to in-car social networks, you can drive more safely. By connecting an onboard computer, you can also intelligently control the vehicle [1]. Solve problems such as forgetting to lock car pillars, shutting down the engine, and prompting smart users to deal with them in a timely manner. Although the diversification of in-vehicle intelligent applications provides endless prospects for the development of the automotive Internet, the lack of network scalability and security of the traditional mobile Internet has also contributed to the development of automotive Internet. Brings challenges [2]. Today’s car dialing equipment is mainly connected directly to human networks through 3G/4G network cards. Each car can only get one dynamic dial IP. The network information of the second and third layers of the vehicle terminal cannot be effectively transmitted to the intelligent vehicle application platform in the cloud computing node. Increase the difficulty of identifying each device on the platform [3]. With the rapid development of the Internet, its security has become increasingly prominent. There are potential security risks in using the mobile Internet to implement automotive networks, including transmitting personal and vehicle data, attacking smart car application platforms, and failing to ignore security issues. In this article, we designed the initial architecture of the model, developed it using PON technology, and used a PON system. The PON system is mainly composed of an optical line terminal (OLT), an optical distribution network (ODN), and an optical network. This paper proposes a FTTH multi-network mode design based on wireless optical network EPON technology. Due to the high demand for FTTH and spectrometers and PON ports, please use spectrometers in the computer room or optical intersection.

2 Method The vehicle network-based network model is an innovative service model of cloud network fusion. Its main design is as follows. (1) Through a dedicated network, assign a fixed dedicated network IP to each 4G dialup card, establish a fixed line channel, and completely improve the security of vehicles and personal data [4, 5]. (2) Use tunnel technology or large-scale two-layer technology to implement a fixed IP strategy for vehicle terminals to meet the requirements of rapid identification of terminals, avoid unnecessary application platform development; achieve loose coupling and improve network flexibility.

Design of Networking Network Model

111

(3) Combining cloud computing and network function virtualization technology to achieve the flexible arrangements required for network functions, avoiding excessive one-time investment costs, effective cost savings and control have been achieved [6]. The PON system is mainly composed of three parts. Optical Line Terminal (OLT), Optical Distribution Network (ODN), Optical Network Unit (ONU). Here, the optical line terminal (OLT) carries various service signals, sends the access part to the end user, and classifies the signals from the end user according to various services, which are different from each other [7, 8]. Must be sent to the service network. Optical distribution network (ODN) provides optical transmission equipment between OLT and ONU, and has four different configurations, namely star, wood, bathroom and ring [9]. In this configuration, the optical network unit (ONU) is responsible for exchanging information with the optical line terminal (OLT), and can provide user access rights by integrating or removing user network interface equipment. The PON system interface includes data downlink and data uplink; in the case of data downlink, the OLT can send data to any ONU at any time, and in the uplink direction, the OLT can simultaneously send an ONU [10].

3 Experiment 3.1 Experiment Purpose The validity of the FTTH networking model proposed in this paper is verified. 3.2 Subjects Connected vehicle FTTH networking mode. 3.3 Experimental Design We researched and compared the feasibility of our network model in driving test. Regarding the intelligent driving test supervision platform network: through telecommunications, the Internet APN network dedicated to intelligent driving vehicles is realized, connected to telecommunications, and the fixed IP vehicle network LNS platform is supported. Intelligent information services are deployed on cloud nodes. The car dial device is designed in GRE mode and only supports GRE. In the telecommunication information service cloud node, we opened a set of total virtual FW and total ROS, and opened a set of driving school FW and ROS for the driving license school according to the actual online plan and the actual online plan. These all correspond to test vehicles under the same training. The intelligent test and monitoring platform VDC opens a GRE tunnel between the car’s on-board dialing equipment and the ROS of the driving license school, drives the fixed IP of the school’s on-board equipment, and directly accesses the cloud nodes that deploy comprehensive information services. Guaranteed you can do it. The communication intelligent information service cloud node will open the MPLSVPN

112

J. Bao

business through the large channel on the B plane of the IP Castle LAN, and contact government agencies, driving schools and VPN groups, and supervise the intelligent driving test and platform, government management and central supervision of the agency The centre and the test centre of the driving school are connected seamlessly.

4 Discussion 4.1 Comparison of Different Access Mechanisms The current research results based on the above access methods and their corresponding performance pairs are shown in Table 1. As can be seen from the table, compared with other mechanisms, the CSMA/CA mechanism has the characteristics of high throughput, low delay, and low packet loss rate. Therefore, 802.11p is the most widely used communication protocol in the Internet of Vehicles. It is at the MAC layer. EDCA channel access mechanism formed by adding differentiated service priorities based on CSMA/CA is used. Table 1. Comparison of channel access mechanisms Access form

Existing Throughput Performance Packet Advantage access loss mechanism rate

Centralized CDMA access

TDMA

Disadvantage

Medium

Delay

Low

Large system capacity and good confidentiality

Multiple access interference, high communication cost

High

Low

Low

Low energy consumption and strong anti-interference ability

Large time synchronization overhead and complex frequency allocation

Medium

Low

Flexible and fair Conflict

Distributed CSMA/CA High access

Although the EDCA protocol divides the service priority, the division method is fixed, and after the AC queue is assigned, the channel conflict, information collision, and transmission failure in the message sending process, the calculation parameters of the competition window are also fixed, so Can not meet the needs for the efficient transmission of a large number of messages in the Internet of Vehicles. First, redefine the priority division method, then set the network status threshold, and dynamically calculate the backoff window value according to the threshold to achieve adaptive and dynamic information access and improve communication efficiency.

Design of Networking Network Model

113

4.2 Validation of Networking Model In this paper, we experiment with a driving school on the channel access mechanism and use centralized access to CDMA. We compare the effectiveness with the real-life vehicle networking model by comparing it with real people. From the data in Fig. 1, it can be seen that the passing rate of the four subjects of the driving license test under the driving of the network model is higher than the passing rate of the four subjects of the driving license test by those who already have a driving license. In many vehicles, vehicle problems may also occur, resulting in reduced data. On the network, there may also be local network instability, resulting in data decline. Among them, in Course 1, the passing rate under network mode driving was 96.8%, and the passing rate under driving with a driver’s license was 92.7%. Among them, in the second subject, the passing rate of driving in the networking mode was 98.5%, and the passing rate of driving with a driver’s license was 91.6%. Among them, in Subject 3, the passing rate under the network mode driving rate was 97.1%, and the passing rate under the driving conditions of a driver with a license was 92%. Among them, in Subject 4, the pass rate under the network mode driving rate was 99.2%, and the pass rate under the driver’s license was 93.4%. In contrast, under the networking model proposed by this article, the passing rate of the driving test in four subjects is above 96%, which proves that it is feasible. But in actual application, how much improvement is needed.

100 98 96 94 92 90 88 86 Subject one

Subject II

Subject three

Subject four

Pass rate under the networking model of connected cars (unit: 100%) Pass rate when driving with a driver's license (unit: 100%) Fig. 1. Comparison with normal driving in a network model

5 Conclusion In terms of method, this paper mainly designs the preliminary structure of the model, and proposes to improve it under the PON technology, and uses the PON system, which is mainly composed of optical line terminal (OLT), optical distribution network (ODN), and optical network (ONU). composition. This paper proposes the design of FTTH networking mode based on EPON technology. Since FTTH requires a large number of

114

J. Bao

splitters and PON ports, the splitter method is used in computer rooms or optical intersections. In terms of experiments, the validity of the FTTH networking model proposed in this paper is mainly verified. By comparing the pass rate of the four subjects of the driver’s license with those of the driver’s license, it is found that the pass rate of the vehicle-connected FTTH networking mode is higher than that of the driver’s license, and exceeds 96%.

References 1. Tang, H., Yuan, Q., Lu, G.: A model for virtualized network function deployment based on node-splitting in vEPC. J. Electron. Inf. Technol. 39(3), 546–553 (2017) 2. Cotroneo, D., Natella, R., Rosiello, S.: NFV-Throttle: an overload control framework for network function virtualization. IEEE Trans. Netw. Serv. Manage. 14(4), 949–963 (2017) 3. Sun, C., Bi, J.: HYPER: a hybrid high-performance framework for network function virtualization. IEEE J. Sel. Areas Commun. 35(11), 2490–2500 (2017) 4. Li, H., Mao, X., Wu, C.: Design and analysis of a general data evaluation system based on social networks. EURASIP J. Wirel. Commun. Netw. 2018(1), 109 (2018) 5. Pan, C., Zhang, R., Chen, L.: Research on variable current regenerative braking control strategy based on radial basis function neural network tuning PID control. J. Comput. Theor. Nanosci. 14(1), 468–476 (2017) 6. Li, G., Zhao, G., Zhou, C.: Stochastic elastic properties of composite matrix material with random voids based on radial basis function network. Int. J. Comput. Methods 15(1), 1750082 (2017) 7. Long, P.M., Sedghi, H.: On the effect of the activation function on the distribution of hidden nodes in a deep network. Neural Comput. 31(12), 1–19 (2019) 8. Wu, W., Liu, M., Yu, S.: Current model analysis of South China sea based on empirical orthogonal function (EOF) decomposition and prototype monitoring data. J. Ocean Univ. China 18(2), 305–316 (2019) 9. Liu, L., Cheng, X., Lai, J.: Segmentation method for cotton canopy image based on improved fully convolutional network model. Trans. Chin. Soc. Agric. Eng. 34(12), 193–201 (2018) 10. Liu, J., Duan, S., Li, T.: Design of RBF neural network control system based on spintronic memristor for robotic manipulator. Yi Qi Yi Biao Xue Bao/Chin. J. Sci. Instr. 39(8), 212–219 (2018)

Intelligent Media Technology Empowered Brand Communication of Chinese Intangible Cultural Heritage Lei Cui(B) and Xiaofen Shao School of Marxism, Tongling University, Tongling 244000, Anhui, China [email protected]

Abstract. Intelligent media technology has the characteristics of immersive experience in all aspects, blended user experience and two-way interactive experience, creating a new pseudo-environment between users and information, capturing the attention of fast-paced information consumer audiences, and achieving accurate push. Expanded the intangible cultural heritage (ICH) communication groups and consumer subjects, and built a brand-new modern communication network for the communication of ICH, which is of great significance for building the national cultural soft power and improving the national image. Establish Chinese ICH brand communication system by improving the accuracy of branded communication, refining core brand symbols and values, strengthening the development and communication of brand creativity, and protecting the intellectual property rights of communication brands, but must also follow the rules of modern information communication to strengthen community protection of ICH, achieve an orderly and harmonious development. Keywords: Intelligent media technology · Intangible cultural heritage · Brand communication · Pseudo-environment · Holographic image

1 Introduction We begin this paper with a consensus: The intelligent media technologies represented by 5G and artificial intelligence integrate video and text, games and learning, touch control, etc, subverting the original social public opinion and discourse pattern, and creating a new situation between users and information that “moves with the heart”. In a pseudo-environment, information can be transmitted at a high data rate, and the content is presented in a more vivid and concrete manner. It has established a high-level modern communication network for the communication of intangible cultural heritage (ICH), which is in line with the intelligent trend of the entire information production process. ICH carries the cultural precipitation and essence of the country and the nation, and is the core cultural resource for the nation and the nation to become culturally confident. “Operational Directives for the Implementation of the Convention for the Safeguarding of the ICH” issued by UNESCO in 2018 states that “communications and media” can © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 115–121, 2021. https://doi.org/10.1007/978-3-030-62746-1_17

116

L. Cui and X. Shao

raise awareness of the importance of the public, foster social cohesion, show and express awareness of diversity, enhancing knowledge of local languages and culture, sharing of information and interactive exchange of information [1]. The development of intelligent media can achieve effective protection of ICH, and promote the communication of ICH, which is of great significance for building the national cultural soft power and improving the national image.

2 Background The development of intelligent media technology has moved from concept to practice, which has brought about a huge revolution in the change of the media, and the medium for obtaining information has changed from smart phones to intelligent media. According to the 44th “Statistical Report on the Development of the Internet in China” issued by the China Internet Network Information Center (CCNIC) in June 2019, the scale of Internet users in China reached 854 million, the Internet penetration rate reached 61.2%, and the number of mobile Internet users reached 847 million, 99.1% of Internet users used mobile phones to access the Internet [2]. Smartphones have occupied the main channels for users to obtain information, and “terminals go with people, and information surrounds people” has become a new trend of information communication. The smart phone already constitutes the largest mobile communication network system. According to reports, China is expected to become the world’s largest 5G market in 2025, users will reach 430 million. In the future, all information can be turned into data, which can be obtained with a single smartphone. The short video of 2019 has become the “new social language of the data age.” The survey report shows that since Tik Tok was officially launched in September 2016, the number of daily active users in China has exceeded 250 million and the monthly active users have exceeded 500 million. There are about 65 million short videos of various traditional cultures on the line, more than 4.4 billion likes, and more than 16.4 billion views. On April 2019, 1,372 national-level ICHs representative projects, 1,214 had disseminated relevant content on the Tik Tok platform, and the coverage rate exceeded 88%. These 1,214 items of national-level ICHs produced more than 24 million videos and more than 106.5 billion plays [3]. Tik Tok has actually become the largest platform for disseminating ICH. The feature documentary, as “Masters in the Forbidden City” and “The great Shokunin”, defines the recording object as an ICH craftsman, faithfully records and shows the production process of unknown craftsmanship and exquisite artifacts, It brings a huge contrast experience to young audiences, and reminds the public that there is a heavy cultural accumulation behind each of the techniques that are on the verge of being lost, but it also reveals the helplessness of the successors. Intelligent media technology has seized the public’s desire to learn about ICH, especially targeted at the reality of the mainstream user group of young audiences, seized the attention of fast-paced information consumer audiences, achieved accurate push, and expanded ICH communication group has made the approval of young people. Diversified communication channels and display forms have greatly enriched the artistic content and communication forms of ICH, and built a brand-new communication system that meets the growing cultural needs of the contemporary public. Internal communication promotes the traditional culture of China to enhances the sense of national identity; external

Intelligent Media Technology Empowered Brand Communication

117

communication promotes communication and exchanges, enhances the sense of honor and pride of overseas Chinese, and provides a foundation for ICH communication and the expansion of consumer subjects.

3 Materials and Methods Intelligent media technology has fundamentally changed the audience experience and the way of obtaining information. From the past text reading experience to the pursuit of immersive sensory experience, it presents the following characteristics in terms of audience information perception needs and information consumption experience: 3.1 All-Round Immersion Experience Intelligent media technology can make users feel like they are on the scene through infinitely close to realistic image simulation, allowing users to have an immersive experience in all directions. Holographic communication technologies represented by Virtual Reality (VR) and Augmented Reality (AR) make users feel “immersive” when using the technology. Holographic images such as the “simulated world” created by VR equipment and “reality + virtual” created by AR equipment bring a new perception and cognitive experience through the superposition of reality and virtual scenes, triggering the audience to develop a rich imagination and reproduce the intangible culture The real historical geographic information and cultural image space of the heritage [4], activate knowledge experience and emotional experience. The application of intelligent media technology to the protection and communication of ICH will effectively improve the quality and efficiency of interaction, which will not only bring a new communication experience for the ICH to the public, but also increase the public’s cognition. 3.2 Blended User Experience Intelligent media technology emphasizes the user’s psychological feeling and presence experience in the scene, produces a strong sense of presence, and improves the effectiveness of information communication. The holographic images in intelligent media technology have been applied in virtual exhibition halls or digital museums to manage information communication of folk arts and crafts in a digital manner and then present them in a living manner. For example, the “Global Kun Opera Digital Museum” and “Qingming shanghe Tu 3.0” interactive art exhibitions have digitally processed the documentary image data and combined with various immersive performances to reproduce the real scenes and create a 360-degree scene of teahouses, theaters, markets, neighborhoods, gardens, etc. [5]. It realized the reorganization of historical scenes and the fusion of spatial images, and improved user participation in space-time traversal and virtual worlds.

118

L. Cui and X. Shao

3.3 Two-Way Interactive Experience Intelligent media technology, in comparison, pays more attention to the user’s feelings and perceptions when they influence the interactive experience, and the communication and feedback in the two-way interactive experience between users and holographic images, users and virtual environments. Take the interactive experience of The Silk Road by VR to users, this sense of interaction can be analyzed from both the internal and external aspects of the video. The scene scheduling within the image triggers indirect feedback from the user, which is mainly achieved by creating an “environment”, and then the user interacts with the “environment”. The specific methods include adjusting the lighting shape to simulate the real light feeling, and adjusting the camera movement to simulate The Silk Road in people’s perspective. The scene scheduling outside the image triggers the direct feedback from the user, which is mainly caused by the user’s use of the haptic device to “sense” and then generate interaction, using gestures, virtual buttons, etc. [6].

4 Results 4.1 Improve the Accuracy of Branded Communication The number of ICH under the fourth grade protection systems is huge. Four published batches listing 3,140 national ICH projects. There have great differences between different categories (Fig. 1). The characteristics, methods, and channels of technical communication of ICH should be selected and targeted to locate individualized brand communication channels and methods.

Fig. 1. Type-structure features of intangible cultural heritage (ICH) projects in China

ICH products have high recognition, simple production technology, broad market prospects and industrial standard production. Such as Huizhou stone carving, The craft of Shu-xi, Xiaoxian peasantry painting and other well-known folk arts, mass-produced

Intelligent Media Technology Empowered Brand Communication

119

by mechanized production lines according to market requirements, and enhance the brand’s influence. For labor-intensive products that rely mainly on manual production and high cultural creativity, they should protect and respect the individual’s creative creation and production, appropriately introduce modern craftsmanship, position high-quality and sophisticated brands, and protect non-materials by exerting market functions. The core skills of cultural heritage products increase cultural added value to promote their products and services. Projects with low market acceptance and unsuitable for industrial development are gradually shrinking due to the impact of modern social consumption methods and diversified leisure and entertainment channels. They should be positioned to create highquality products, sort out brands, and use modern media technology to widely publicize and inherit. Encourage the combination of ICHs and cultural resources with local tourism resources, geographical landscapes and ecological resources, to promote the integrated development of the cultural industry, tourism and entertainment. 4.2 Refining Core Brand Symbols and Values The brand iceberg theory points out that brand logos and symbols only account for 15%, and 85% are hidden values, wisdom and culture. These core values have the characteristics of exclusivity, appeal and compatibility, and are the key elements and core of brand communication basis. Focus on inheriting core skills and cultural connotations. ICH contains profound humanistic connotation and cultural value. The key to its branding operation is to extract core brand symbols and values. These very new brand symbols and values are the connotation, essence or core skills condensed in the development process of ICH. It’s the key factor for the public to identify them, allowing them to appreciate the superb traditional skills, the heavy historical and cultural connotations, and the simple practical value. Focus on absorbing modern intelligent media technologies. In the traditional era, the inheritance of ICH is mostly dictated by personal experience, which limits the radiation of the inheritance of skills, resulting in the severance of some ICH skills. At this time, the proper introduction of modern technology can not only meet market demand, but also preserve and save traditional skills. For example, the development and revival of the three carvings in southern of Anhui, the production of rice paper, and the embroidery of the Miao nationality are the best proof. While adhering to manual techniques and maintaining traditional methods, they introduced modern new technologies and developed new products with modern flavor [7]. However, it should be noted that the protection of ICH cannot blindly deny the entry of modern technology, but cannot rely on new technology, and must maintain its intrinsic core value. 4.3 Strengthen the Development and Communication of Brand Ideas Exploiting the potential cultural and economic value of ICH, enhancing the influence of ICH transmission, and transforming cultural resources into cultural productivity are the best ways to protect ICHs. The capital age is gone, and the creative age is here. Many traditional cultural resources in China have been developed abroad to develop

120

L. Cui and X. Shao

their cultural industries, such as cartoons “Kung Fu Panda” “Mulan” “Dragon Ball” and “Three Kingdoms”. The development and communication of ICH brand ideas has brought unexpected and great success. The “God’s Enclosure” in the fantasy animation movie “Big Fish and Begonia” is based on the ICH of Hakka earth building. A series of successful creative development and communication at home and abroad shows that cultural creativity is a transformation bridge between traditional cultural resources and modern industrial resources. It will contain cultural genes and cultures created through historical accumulation and modern creation in ICH cultural products and cultural activities. The elements are reorganized and spread to build a new ICH brand. At present, the key to the creative development of ICH brand lies in innovation-driven, creative inspiration and shaping. Excavate and develop the core cultural symbols and cultural values contained in the ICHs, and construct new cultural ideas. Originality and exclusivity are the key to ICH products to show cultural identity, gain social identity, and enhance market competitiveness. Under the premise of combing and integration, we must extract the core cultural symbols and cultural values of ICH, and build new ones. To expand the radiant power, attractiveness, influence and vitality of ICHs. Choose the most bearable and expressive carrier to create a brand new ICH in the creative era. In response to consumers’ aesthetic tastes and consumer desires, with the help of intelligent media technology, cultural resources can be transformed into cultural productivity, cultural creativity can be transformed into cultural products, and the brand’s agglomeration, derivative, diffusion, amplification, drive, linkage and other communication effects can be created to new benefits, nurture cultural heritage, form a virtuous cycle of development, and truly protect, inherit and innovate the core values of ICH. 4.4 Protecting the Intellectual Property of Communication Brands Because the identification of the ICH right holder is difficult to determine, whether traditional techniques constitute commercial secrets is still controversial, and rights protection, legal gaps, and lack of protection are the reasons. Intellectual property protection of the value of ICH brands must be: At present, the relevant current laws on the protection of ICH require that the right holder of the ICH be clearly identified, which is representative, unique and subjective. The lack of knowledge accumulation and the poor orientation of economic interests of the grass-roots inheritors in the current protection have increased the difficulty of confirming the right holder’s subjective status [8]. At the same time, the legal protection of intellectual property rights is pursuing “intra-generational equity”, monopoly protection is limited to rights holders, not “intergenerational equity” between teachers and apprentices, fathers and sons. The group inheritance of ICHs makes it difficult to determine the sole subject right holder. If it is forcibly confirmed by administrative means but a good benefit sharing mechanism is not established, it is likely to cause the isolation of the sole right holder. Traditional communities are the original domain of ICH inheritance. If the two are far away, it will cause alienation of ICH inheritance. Therefore, it is necessary to clarify the independent legal subjects of traditional communities and establish the intellectual property rights that are collectively shared by communities.

Intelligent Media Technology Empowered Brand Communication

121

The rapid development of modern information technology has enriched the inheritance of ICH communication, and has also produced digital heritage. These digital heritages are embedded with the core cultural elements of ICHs identification [9], which enhances the comprehensive competitiveness of ICH brands and brings the necessity and urgency of intellectual property protection.

5 Discussion The communication of ICH brands under the empowerment of intelligent media technology must follow the rules of modern information communication, innovative communication ideas and methods, excavate the core values of ICHs, and carry out communication activities with the concepts of original ecology, innovation and fashion. The communication of ICH brand must be based on the protection of ICH. The community protection in the area where the ICH is inherited should be strengthened, and the protection of deep traditional skills of products should be strengthened. This is the protection of ICH. The essence is. The essence of communicate ICH brands is to enable the traditional skills to be actively and orderly spread, to cultivate a cultural ecology, living environment, and inheritance methods suitable for it, and to develop harmoniously in tradition and modernity, material and spiritual, and national and world. Acknowledgements. This work was financially supported by the Philosophy and Social Science Planning Project of Anhui Province (AHSKQ2016D86, AHSKYG2017D176); The Social Science Innovation and Development Research Project of Anhui Province (2019CX131).

References 1. Information on https://ich.unesco.org/en/directives 2. Information on http://www.cac.gov.cn/2019-02/28/c_1124175686.html 3. Li, Y.: When the intangible cultural heritage meet the live broadcast: new media empowered the communication of the intangible cultural heritage. China Culture Daily, 9 September 2017 4. Peng, D.: Research on future imaging in the context of intelligent media. J. People’s Forum 24, 40–49 (2018) 5. Information on http://world.people.com.cn/n1/2017/0826/c1002-29496035-2.html 6. McLuhan, E., Zingrone, F.: The Essence of McLuhan. Nanjing University Press, Nanjing (2000). pp. 152 7. Scoble, R., Isler, S.: The Coming Age of Scenes. Beijing United Publishing Co., Ltd., Beijing (2014). pp. 212 8. Huang, Y.L., Yu, H.: Application of intelligent media technology in the communication of Chinese intangible cultural heritage. J. Central China Normal Univ. (Hum. Soc. Sci.) 58, 122–129 (2019) 9. Cheng, M., Zhan, L.Q.: The impact on digital survival and art perception in scenes of intelligent media. J. Commun. Univ. China 40, 92–97 (2018)

Construction Strategy of Smart English Teaching Platform from the Perspective of “Internet + Education” Zhenhua Wei(B) Xi’an Siyuan University, No. 28 Shui’an Road, Xi’an 710038, People’s Republic of China [email protected]

Abstract. The advent of the “Internet + Education” era has brought smart education into a higher stage of development. Teachers’ intelligent learning is not only a technological change, but more importantly, integrating network thinking into the teacher’s learning. The concept of intelligent teaching allows students to learn more scientifically. English education is an important part of school education, which lays a good foundation for improving the overall quality of students. With the development of Internet technology, it provides a new platform for school English teaching. It provides favorable conditions for teacher-student interaction and improves the educational effect of school English and student learning. The purpose of this article is to study the construction strategy of smart English education platform from the perspective of “Internet + Education”. In terms of methods, this paper proposes the coexistence of multiple learning modes to improve the original learning mode, build a personalized, experiential teaching ecosystem, and realize two-way interaction between online and offline to better improve learning efficiency. And establish a teacher-student interaction communication platform, teachers can adjust their own teaching progress, content, methods, etc. based on the feedback of students in the discussion group. Install assisted composition correction software to reduce the burden on teachers, thereby spending more time and energy to educate students. In terms of experiments, through the establishment of experimental classes and control classes, teaching is carried out separately, and the examinations are conducted before and after teaching. Send a questionnaire at the end of the period to see its satisfaction. It is found that the teaching platform of Internet + Education proposed in this paper is superior to traditional teaching in terms of learning effect and students’ satisfaction with learning. Keywords: Wisdom education · English teaching · Learning resources · Teaching effect

1 Introduction In today’s era, the computerization of the Internet is becoming more and more popular, and more and more people are using the Internet for learning and interaction. English is a global language and it is important to master English. The internet education platform © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 122–128, 2021. https://doi.org/10.1007/978-3-030-62746-1_18

Construction Strategy of Smart English Teaching Platform

123

combines students’ hearing and vision, which maximizes the learning efficiency of students and improves their English level. Earlier, IBM introduced the idea of “intellectual education”. It is derived from the “smart earth” inference put forward by IBM, as well as the philosophy of smart cities, smart communities and smart transportation. In essence, the next generation of information technology makes the Internet possible, makes everything on the planet smart, and is included in scientific and technological development plans by many developed countries. The Chinese government has made it clear that “Internet +” has been incorporated into the national strategy, and “Internet +” has been deeply integrated with various industries, and each industry is promoting optimization, growth and innovation. The proposal of the “Internet +” strategy has brought a new wave of wisdom, bringing smart education to a higher stage of development through technologies such as big data, artificial intelligence and mobile communications. There is no doubt that teacher training can also adapt to the development needs of the “Internet +” era, establish teachers ‘wisdom and learning environment, and continuously improve teachers’ learning level, awareness and communication ability. In recent years, China’s higher education has developed rapidly, students’ English proficiency has been greatly improved, and English education has achieved great results. However, behind the achievement, there are still some problems in English teaching, especially in oral teaching [1]. On the student side, the vast majority of students lacked interest and motivation in spoken English; lacked self-confidence and did not dare to speak “English” boldly; they were too rigid in their knowledge of English, and did not know how to use it correctly, when and where to use it; And I don’t know much about the culture of English-speaking countries, and there are some errors in the form of expression, way of thinking, internal structure, etc. [2]. Coupled with limited class time, the number of college English classes is about 50, students can not fully practice, and many schools do not include spoken language in the final examination, and the evaluation system is not scientific enough. As a result, students have not paid enough attention to spoken English, have no enthusiasm, talk about the “speaking” discoloration, and Chinese expressions [3]. In terms of teachers, college English listening and speaking courses are set together, and most teachers emphasize “listening” but not “speaking”, and pay less attention to oral teaching. In terms of methods, this paper proposes the coexistence of multiple learning modes to improve the original learning mode, build a personalized, experiential teaching ecosystem, and realize two-way interaction between online and offline to better improve learning efficiency. And establish a teacher-student interaction communication platform, teachers can adjust their own teaching progress, content, methods, etc. based on the feedback of students in the discussion group. Install assisted composition correction software to reduce the burden on teachers, thereby spending more time and energy to educate students.

2 Method 2.1 Achieving “Hybrid” Coexistence of Multiple Learning Modes School education in the “Internet +” era has an inherent cultural gene. In classroom education, there is no good education content and education system [4, 5]. Transform

124

Z. Wei

Internet + education into mobile social networks, transition classroom design, largescale online courses, micro-courses, etc., to make these teaching carriers restrict and balance each other [6]. 2.2 Build a Personalized and Experiential Teaching Ecosystem Mobile Internet technology has been popularized in school education, creating multiple forms of education, including unique services [7]. In order to establish a more unique and more experiential education ecosystem in this type of education, we will promote personalized education, carry out various forms of education activities according to the learning needs of students, experience new models and establish a rich education environment [8]. Actively change education concepts, integrate education content and resources, and establish offline symbiosis ecosystems online. 2.3 Establish an Interactive Platform for Teachers and Students English internet education platforms for schools can be set up to release the time and space restrictions on teachers and students, and help teachers provide online guidance for students [9, 10]. Create chat rooms and seminars to provide an effective way for dialogue between teachers and students. For example, students can discuss their questions at a seminar and discuss each other for valid answers. English learning experiences can also be shared at seminars. For teachers, the information feedback from students to the seminar can adjust their course progress, content and methods, and teach some questions by themselves, so as to really improve the effectiveness of the English classroom [11]. In addition, teachers answer questions on the Internet at fixed times each week and answer student questions. Courses on specific topics and specific English learning methods can be offered regularly. Improvements in learning skills such as reading comprehension and listening are not limited to overnight, nor is a single lesson that can produce significant effects [12]. However, by establishing a teacher-student communication platform, students will definitely improve their English level through long-term learning and communication. The self-study system can automatically track students’ study time, effect, etc. 2.4 Install Auxiliary Composition Correction Software Writing is an important part of English, and related research shows that many students have not specifically improved their English writing skills. Improving students ‘English writing skills takes time and process, but installing an auxiliary writing editor can improve students’ English writing skills to a certain extent. After the student has completed the manuscript of the dissertation using the assistant composition editor, place it on the education platform, and then click the “Revision” button to modify the text created by the student [13]. Corrected text has specific scores and corresponding comments. This method can help students understand writing level, provide guidance for understanding writing problems and improve writing level. It has a certain accuracy for errors in the overall structure. In a way, it can help improve English writing skills. In addition, it saves the teacher time to correct the composition. It helps teachers make the most of the time they save for teaching research.

Construction Strategy of Smart English Teaching Platform

125

3 Experiment 3.1 Experiment Purpose Test the effectiveness of the combination of online and normal classes in the Internet + Education “teaching platform” proposed in this article. 3.2 Subjects Two classes in a college of English at a university. 3.3 Experimental Design Through the relevant experiments on two classes of a college of English in a university, the use of free supplementary lessons as benefits during the summer vacation, traditional education and online and normal classes in the “Internet + Education” teaching platform proposed in this article respectively Way of education. The traditional class is the control class, and the “Internet + education” teaching platform education is the experimental class. There are 50 students in each class, the average grades are similar, and the teachers are invited from outside, and the level is similar. Classes are usually simulated in accordance with the school’s schedule. Classes are held five days a week, four classes in the morning, and two classes in the afternoon. The dictation and literacy classes are cross-cut, and the lessons in both classes are consistent. After returning home from the experimental class, the teachers will assign homework and check it next time. In the control class, homework is assigned by the teacher on the teaching platform after returning home from class, and is corrected using the auxiliary composition correction software. Usually on weekends, teachers will send some related learning materials. Finally, I maintained the teaching for 8 weeks, and conducted a bottom examination before and after the teaching to check the changes in the learning effect. After the end, a questionnaire survey was conducted on each student to check their satisfaction.

4 Discussion 4.1 School English Teaching Concept At the same time that the mode of the Internet affecting various fields has changed, the school’s English teaching philosophy has also changed and innovated, and information technology based on the Internet and big data platforms has opened a second English class. In order to meet the needs of personalized English learning, we have established a scientific and advanced English online education information system, and set up the collection, analysis, processing and application of English education data in the new school English education system. Using advanced digitization and information technology to achieve data processing in school English teaching (Table 1). It can be seen from the data in the table above that before the summer vacation, the English levels of the two classes were similar. The average score in the experimental class was 0.3 points higher than the average in the control class, and the number of passing

126

Z. Wei Table 1. Mapping of experimental and control classes Average grade Average grade Passing number of Number of passers in experimental classes the control class

Before studying 78.6

78.3

43

42

After studying

85.1

47

49

83.6

students was higher than the control class One. And the pass rate of both classes is above 80%, and their levels are high. However, there is a certain gap between the improvement of the two classes after the summer vacation. The average score in the experimental class increased by 5 points, and the average score in the control class increased by 6.8 points, 1.8 points more than the experimental class. 1.5 points more. In terms of passing numbers, there were 4 more experimental classes, 7 more control classes, and 3 more experimental classes. In general, the control class is better than the experimental class. 4.2 “Internet + Education” Massive Resources and Students’ Personalized English Learning Under the “Internet + Education” platform, school teachers can use the “Internet + Education” resources to focus on students’ self-learning according to their learning needs. Collect and analyze relevant information materials and set conditions for students to learn English personally. The huge resource of “Internet + Education” requires teachers to prepare topics and materials for English courses. Students need to use resources on the Internet to find and read relevant information. Teachers organize and analyze these reading data to provide personalized English education for each student. 4.3 Satisfaction of Experimental and Control Classes From the data in Fig. 1 below, it can be seen that 22 people in the experimental class were satisfied with the 8 weeks of summer vacation, and 38 people in the control class were satisfied with the 8 weeks of summer vacation. Among them, 7 were dissatisfied with the summer study in the experimental class, and only 2 were dissatisfied with the summer study in the control class. The platform proposed in this article supports online testing and online learning for students. During classroom learning and self-assessment, students are graded by the system and then a chart is created. Teachers use the data to understand the situation of students and better evaluate and reflect on each stage of education.

Construction Strategy of Smart English Teaching Platform

127

25 20 15 10 5 0 Very satisfied

More satisfied

general

Dissatisfied

Number of experimental classes satisfied with the course Number of students who are satisfied with the course Fig. 1. Comparison of learning satisfaction between experimental and control classes

5 Conclusion In terms of methods, this paper proposes the coexistence of multiple learning modes to improve the original learning mode, build a personalized, experiential teaching ecosystem, and realize two-way interaction between online and offline to better improve learning efficiency. And establish a teacher-student interaction communication platform, teachers can adjust their own teaching progress, content, methods, etc. based on the feedback of students in the discussion group. Install assisted composition correction software to reduce the burden on teachers, thereby spending more time and energy to educate students. In terms of experiments, through the establishment of experimental classes and control classes, teaching is carried out separately, and the examinations are conducted before and after teaching. Send a questionnaire at the end of the period to see its satisfaction. It is found that the teaching platform of Internet + Education proposed in this paper is superior to traditional teaching in terms of learning effect and students’ satisfaction with learning.

References 1. Jan, S.U., Hussain, A., Ibrahim, M.: Use of internet by the teaching faculty of Peshawar Medical College, Peshawar, Khyber Pakhtunkhwa, Pakistan. J. Pak. Med. Assoc. 68(3), 459 (2018) 2. Svantesson, D.: “Lagom Jurisdiction” – what viking drinking etiquette can teach us about internet jurisdiction and Google France. Masaryk Univ. J. Law Technol. 12(1), 29–48 (2018) 3. Ge, H.: Research on the Chinese foreign English teaching quality assessment with intuitionistic fuzzy information. J. Comput. Theor. Nanosci. 15(1), 278–281 (2018) 4. Yuan, B.: On the pragmatic functions of english rhetoric in public speech: a case study of Emma Watson’s HeForShe. Engl. Lang. Teach. 11(3), 113 (2018) 5. Wu, Q., Zhang, P.: E-learning user acceptance model in business schools based on UTAUT in the background of internet plus. J. Shanghai Jiaotong Univ. 52(2), 233–241 (2018)

128

Z. Wei

6. Kelly, C.: Learning to talk back to texts: multimedia models for students (and teachers). Pedagogy 18(3), 271–286 (2018) 7. Yousuf, O., Mir, R.N.: A survey on the Internet of Things security: state-of-art, architecture, issues and countermeasures. Inf. Comput. Secur. 27(2), 292–323 (2019) 8. Rahman, M.M., Pandian, A.: A critical investigation of English language teaching in Bangladesh: unfulfilled expectations after two decades of communicative language teaching. Eng. Today 34(3), 43–49 (2018) 9. Granados-Beltrán, C.: Revisiting the need for critical research in undergraduate Colombian English language teaching. HOW 25(1), 174–193 (2018) 10. Baa, S.: Lecturer perceptions toward the teaching of mathematics using English as a medium of instruction at the international class program (ICP) of mathematics department of the state. J. Phys. Conf. 1028(1), 012131 (2018) 11. Skidmore, D., Murakami, K.: Dialogic pedagogy: the importance of dialogue in teaching and learning. Engl. Educ. 51(2), 1–3 (2018) 12. Ruthven, K.: Characteristics and impact of the further mathematics knowledge networks: analysis of an English professional development initiative on the teaching of advanced mathematics. Teach. Math. Appl. 33(3), 137–149 (2018) 13. Li, M.: Investigation on application of association rule algorithm in English teaching logistics information. Cluster Comput. 4, 1–7 (2018)

Online Writing Effectiveness Under the Blended Teaching Mode of Moscotech APP Juan Qian(B) School of Foreign Studies, Anhui Xinhua University, Hefei, Anhui, People’s Republic of China [email protected]

Abstract. The rapid development of modern information technology has brought great changes to People’s Daily work and life, and the extensive application of network information technology in modern English teaching will bring about a series of innovations to the traditional English teaching mode. Based on the mixed English teaching mode promoted by the network environment, this paper constructs the mixed learning mode of Moscotech APP and applies it to English writing teaching. The results show that blended learning is more effective than traditional teaching. There is a significant positive correlation between the learning experience value and the final assessment result. This comparative study on the effectiveness of the large-scale online automatic correction software will be helpful to improve the teaching of college English writing. Keywords: Blended teaching mode · College English writing teaching · Moscotech APP

1 Introduction With the rapid development of the Internet and the deepening reform of modern education system, people pay more attention to the application of teaching methods and learning strategies. China’s Modernization of Education 2035 adovates that “Make full use of modern information technology to enrich and innovate curriculum forms” and “promote heuristic, exploratory, participatory and cooperative teaching methods” [1]. Education Informatization 2.0 Action Plan proposes that “Education informatization is the basic connotation and prominent feature of education modernization” and “adhere to the core concept of in-depth integration of information technology and education and teaching” [2]. These important programmatic documents provide ideas for the reform of curriculum construction and learning mode. The traditional teaching mode of classroom is characterized by teacher-centered features, which cannot resonate with the development trend of educational informatization, nor can it meet the learning needs of students, let alone improve the learning mode of students. In view of this situation, educators should think deeply about how to keep the upright and innovative learning mode and how to promote the deep integration of modern information technology and teaching so as to improve the learning effect. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 129–135, 2021. https://doi.org/10.1007/978-3-030-62746-1_19

130

J. Qian

1.1 Definition of Blended Teaching Model At the beginning of the 21st century, American scholars Smith, J and Alert Masier jointly put forward a new concept of learning mode, namely “Blended-Learning”, which is an organic integration of traditional Learning and e-learning to improve the deficiencies of network teaching and form the blended Learning model. Subsequently, a large number of scholars and teaching workers at home and abroad have conducted in-depth research on hybrid learning and teaching, Among which, Russel T. Osguthorpe and Charles R. Graham put forward in the article that “blended learning combines face-to-face mechanism with distance mechanism… People who use blending learning environment are always trying to maximize the benefits of face-to-face learning and online learning.” [3]. Margaret Driscoll and others believe that blended learning mode is an effective way to combine multiple network technologies, multiple teaching methods, and multiple forms of teaching techniques with face-to-face teacher guidance to complete teaching techniques and practical tasks [4]. Many domestic scholars and experts have studied the Blended teaching mode and written books. Professor Ho Kekang (2004) pointed out that “the blended teaching mode is a combination of various learning methods in traditional classroom teaching—The combination of audio-visual media teaching methods with traditional classroom teaching methods; The combination of CAI and traditional teacher’s single instruction; the combination of students’ independent learning and cooperative learning” [5, 6]. After long-term research, Professor Huang Ronghuai proposed that “blended learning is a strategy to implement teaching by integrating different learning theories, techniques and means as well as different application methods” [4]. 1.2 Moscotech APP Moscotech APP is a mobile teaching assistant APP. Teachers use mobile devices or computers to manage classes, send notifications, share resources, assign homework, organize class sign-ups, conduct discussions and answering questions, therefore Moscotech APP are an SPOC. Both the classroom and the after-school are learning sites. Teachers can carry out interactive teaching activities such as voting questionnaire, brainstorming, work sharing, timed quiz and unit test at any time, and students can get immediate feedback and comments. Each time students participate in learning activities, learning management platform and teachers can give students learning experience value. Moscotech APP dynamically records students’ learning performance through learning experience value, which not only provides longitudinal and horizontal learning comparison, but also provides basis for formative evaluation.

2 Blended Learning Model Construction Based on Moscotech APP As we all know, English learning is inseparable from the five skills of listening, speaking, reading, writing and translation. However, “writing can not only help consolidate the language materials input through reading and listening, promote the internalization of language knowledge, and improve the accuracy of language usage, but also lay a solid foundation for substantive oral competence” (Dong Yafen, 2003:5) [7]. According to the

Online Writing Effectiveness Under the Blended Teaching Mode

131

composition scores reflected by various automated Scoring, although Chinese college students have certain English grammar knowledge and vocabulary accumulation, many students’ English writings are full of mistakes and the words fail to form sentences. It’s self-evident, it is necessary to set up the blended teaching mode based on Moscotech APP. As the helper and consultant for students to construct meaning, teachers use blended learning to guide students to acquire knowledge. The teaching process is divided into three stages, namely, before, after and after class. Before class, teachers upload learning resources of multi-modal writing to the learning platform to create learning situations and environments to stimulate students’ interest and motivation. The learning resources include teaching videos, courseware and network links of knowledge points. Students carry out autonomous learning activities such as reading textbooks, watching teaching videos, browsing courseware and taking notes. Then carry out cooperative learning online, such as participating in question-answering activities, completing group tasks, etc., share the results of collective thinking, and preliminarily complete the meaning construction of the knowledge. When participating in learning activities, the learning platform can give learning experience values to students according to their participation records. In class, teachers implement inquiry learning, that is, problem-solving activities to help students construct knowledge, such as discussion and answering questions, brainstorming, etc. Teaching is no longer to transfer certain ready-made knowledge, but to activate the connection between students’ original knowledge and new knowledge, to eliminate the blind spot of knowledge, promote the accumulation of knowledge and experience, improve the ability to solve problems, and improve the construction of meaning. In classroom learning, teachers grant learning experience value to students according to their classroom performance. After class, students make comprehensive use of the significance of the internalization of online and offline learning activities to construct the knowledge they have learned, including completing offline writing exercises, self-examination and self-reflection, and finally mastering the knowledge points and the significance of the internalization (Fig. 1).

3 Teaching Research Design – Take English Writing as an Example Moscotech APP has an essay correction item. Teachers can set the task details, introducing the key points and requirements of the essay, the scoring method, the scoring points and their respective weights. 3.1 The Research Question The purpose of this study is to investigate the effects of different online automatic composition correction software on college students’ English writing effectiveness. The specific research questions are as follows: (1) Is there any difference in learning effect between blended learning and traditional teaching mode? (2) How to further improve the learning effect of blended writing according to the comments on online literature?

132

J. Qian

Fig. 1. The blended learning model of Moscotech APP

3.2 The Research Object The subjects are students of two parallel classes in the third year of English major in the School of Foreign Languages. Each class has 40 students. The same teacher teaches two classes in English writing. Class A is A controlled class, implementing the teachercentered traditional teaching method. Class B is an experimental class, implementing the learning-centered blended learning method. 3.3 The Research Tools In this study, online writing review platform—Moscotech APP were used, which can automatically judge students’ submitted essays online and give them overall comments, as well as feedback on grammar, vocabulary collocation and non-standard expressions. Students can review, revise and submit new compositions for many times, and the platform can give the scores submitted for each time and keep all text records. The basic data of this study comes from all kinds of data saved by Moscotech APP. The writing task of the students involved in this experiment is an English argumentative essay with no less than 180 words, the title of which was “How can you deal with stress?” Students must within two weeks of the assignment submit their essays directly online or revise their compositions according to the system feedback until the final essay is submitted. 3.4 Practice Effect and Reflection (1) Comparison of the results of mixed learning method and traditional teaching method ➀ Pretest results At the beginning of the semester, the teacher collects the TEM-4 scores of the two classes to measure whether there are differences between the two classes in basic language skills. SPSS 19.0 was used to obtain the scores of two classes and independent sample T-test results, as shown in Table 1.

Online Writing Effectiveness Under the Blended Teaching Mode

133

Table 1. Independent sample T test comparison of writing scores in pretest Average number

N

Standard deviation

Variance

Significance

Class A

79.352

40

−0.575

77

0.875

Class B

80.287

40

The average grade of class A and Class B is 79.352 and 80.287. In the independent sample T-test, the significance level of English writing score was 0.875 > 0.05. There is no significant difference in English proficiency between the two classes. The pretest results show that the premise of this teaching experiment is valid. ➁ post-test experiments After A semester of English writing in both classes, Class A teaches traditional English writing, while class B teaches mixed online writing, again using the final exam scores as A post-test. The grades of the two classes and the independent sample T-test results were collected again. The average scores of class A and Class B were 71.790 and 79.127 respectively (Table 2). Table 2. Independent sample T test comparison of writing scores in post-test Average number

N

Standard deviation

Variance

Significance

Class A

71.790

40

−2.135

78

0.037

Class B

79.127

40

The independent sample T-test results show that P = 0.037 < 0.05, there is a significant difference in the final assessment scores of students using the two teaching methods, that is, the learning effect produced by the mixed learning mode is better than the traditional teaching mode. 3.5 Reflection on the Effect of Blended Learning Blended learning is essentially foreign language teaching in the context of “Internet +”. “The in-depth integration of ‘Internet +’ makes foreign language teaching more ecological, independent and personalized, which can promote foreign language teaching and learning more effectively” [8]. The effectiveness of English writing results from the participation of various learning activities, so the improvement of blended learning needs to consider the factors involved in the learning process from both teaching and learning levels. From the perspective of teachers, according to the characteristics of blended learning model, teaching strategies are related to learning resources, learning activities, learning monitoring, learning evaluation and other factors. Teachers should provide students with

134

J. Qian

blended learning resources. Constructivism emphasizes the use of various information resources to support learning. In order to assist students to actively explore and meaning construction, teachers should set up the “one-stop” learning platform, to provide quality online courses, courseware, text, such as links to the knowledge network learning resources, all-round meet the learning needs of students, make its cast off the yoke of the single teaching materials, absorbing knowledge needed in multi-modal learning resources. From the perspective of students, constructivism emphasizes that the ultimate goal of the learning process is to complete the construction of meaning, and students are the active constructors of meaning. Learning activities should be conducive to the completion and deepening of the meaning of the knowledge construction. Learning activities in the context of the Internet are more likely to attract students’ attention. Students obtain learning content and resources from the “cloud” and choose learning content and activities at their own pace, regardless of time and place. On the learning platform, students can complete learning activities independently or cooperate in groups. Write your own opinion; Manual input of information; According to the platform revision Suggestions, study and polish again and again until the satisfactory work is finished. For example, students benefit from feedback on text structure, vocabulary use, grammar, spelling and other details, and modify and polish them according to the feedback. Example 1 “so just eliminate stress, and only in this way, can we have a smooth life”. Students soon received feedback from the correcting platform about this sentence, adding the preposition to between “just” and “eliminate”, thus correcting the incorrect grammatical structure. Example 2 “so the other will not has much complain to you”. Similarly, the online grading system shows that modal verbs and verbs are mismatched, suggesting have, and so on. In addition, Moscotech APP pays more attention to sentence writing, frequently pointing out the “suspected Chinglish” expressions frequently seen in The English writing of Chinese college students. Example 3 “my life pressure”, “the high developing speed”, and “I very like jogging to relax myself”. As Chinese and English belong to different language families, their grammatical systems are very different. Due to the fossilization of language learning, Chinese students often create similar Chinese English expressions or sentences in writing. Thanks to online writing correction system, they can disclose these errors in time, and correct them immediately. In order to obtain the maximum learning benefit, students should often reflect on what they have mastered, what learning experience is worth promoting, what shortcomings exist, and what methods or strategies should be adopted to improve the learning effect. “The best education is self-education – enabling students to gain self-awareness and self-transcendence” [9]. Only through active reflection, can we find the weakness and improve the measures, and effectively construct the meaning.

Online Writing Effectiveness Under the Blended Teaching Mode

135

4 Conclusion With the rapid development of Internet technology, college English teaching should make full use of modern teaching means such as network technology, develop and utilize digital teaching resources, and construct a new teaching mode suitable for students’ personalized learning and independent learning. In view of this, the author uses the “cloud class” learning platform to implement blended learning in English writing teaching, and the results show that blended learning achieves better results than the traditional teaching method. Through the data analysis and research of “Cloud class”, teachers and students can understand the problems in English writing more intuitively and conveniently through these online correcting software, and make corrections according to the Suggestions provided by the online platform. This study provides some enlightenment and reference for the theoretical research, practical application of blended learning, stimulate the learning interest of students, and improve the writing efficiency of Chinese college students’ English writing. However, in the writing teaching, the automated correction system plays the role of auxiliary teaching [10] and the teachers should rationally supervise the process of writing and make appropriate manual correction. Acknowledgments. This research was supported by 2018 Provincial Quality Engineering Project of Anhui Higher Institute Massive Open Online Courses (MOOCs) demonstration projects (project number: 2018mooc429).

References 1. http://www.xinhuanet.com//mrdx/2019-02/24/c_137845629.htm, 24 February 2019 2. http://www.moe.gov.cn/srcsite/A16/s3342/201804/t20180425_334188.html, 18 April 2018 3. Qsguthorpe, R.T., Grahan, C.R.: Blended learning environments: definition and directions. Q. Rev. Distance Educ. 3, 227–233 (2003) 4. Driscoll, M.: Blended Learning: Let’s Get Beyond the Hype. MB Global Service, no. 11 (2011) 5. Ho, H.: Resistance from blending learning looking at the development of the theory of education technology research. J. Chin. Audio-Visual Educ. 3, 1–5 (2004). (in Chinese) 6. Huang, R., Zhou, Y., Wang, Y.: Theory and Practice of Blended Learning. Higher Education Press, Beijing (2006). (in Chinese) 7. Guo, C., Qin, X.: Research on written feedback of foreign second language learners. J. PLA Foreign Lang. Instit. (5) (2006). (in Chinese) 8. Zhang, Q.: Psychological Principles of Foreign Language Learning and Teaching. Foreign Language Teaching and Research Publisher, Beijing (2011). (in Chinese) 9. Chen, J., Wang, J.: Normal changes and development in the informationization of foreign language Education: the foundation Visualization in Educational Informatization. Foreign Lang. Audio-Visual Teach. 2016(2), 3–9 (2016). (in Chinese) 10. Lu, L., Wu, X., Wang, Y.: Research on the application of Juku Correct Network in English writing teaching. J. He Zhou Univ. 4, 117–121 (2017). (in Chinese)

A Narrative Environment Model for the Sustainability of Intangible Cultural Heritage Under the 5G Era Chen Qu, Ting Zhao, and Wei Ding(B) Southampton International College, Dalian Polytechnic University, Dalian, Liaoning, China [email protected]

Abstract. With the arrival of the fifth-generation mobile networks (5G) era, it has been widely acknowledged that innovative technology has been involved in many aspects, such as social, culture and economy. In this context, the culture creative industries (CCI) are becoming increasingly fused with technologies. As intangible cultural heritage is recognized as a branch of CCI, to what extent and how technology serves as a tool in safeguarding the intangible cultural heritage (ICH), and what media can ICH interact with the audience should be considered. This study contributes to fill this gap and solve the issues by aiming at the Chinese ICH, thereby exploring a narrative environment model for the sustainability of ICH at World Heritage Sites (WHSs) based on the narratology and narrative environment theory under the 5G Era. The practical possibilities drew on the literature review and a develop model based on the narratology theory thereby contributing to the overall aim of this research. It was discovered that 5G technology applied to an interactive narrative space could probably promote the inheritance and protection for ICH and enhance the immersive audience experience in museums. Keywords: Narrative environment · Intangible Heritage Culture (IHC) · Digital museum · 5G technology

1 Introduction 5G is the fifth generation of wireless technology. With the advent of the 5G era, the entire digital culture industry will undergo dramatic changes, which mainly refers to the combination of digital industry with all kinds of industries, making the industry itself produce many new formats, new applications and different application scenarios. Based on the advantages of accessing data more quickly and having a smoother experience, 5G technology can not only make user experience across scenes, but also realize the Internet of everything. For this trend, 5G and more and more new technologies will also change social ecology and promote the development of CCI, from exhibition, museums, the individual artists, display medium, and creation medium, to the latest changes in the cultural market… As the 5G is increasingly closer to daily life, the development of human society is increasingly accelerating and efficiency. The creators, viewers, operators and © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 136–142, 2021. https://doi.org/10.1007/978-3-030-62746-1_20

A Narrative Environment Model

137

traders are facing the unprecedented challenges in how to adapt to the impact and changes brought by high technology. The topic of the sustainability of ICH has become an international concern primarily through the work of United Nations Educational, Scientific and Cultural Organization (UNESCO). Recently, sorts of researchers state the digital reconstruction of preserving ICH and discusses how the innovative technologies play roles in inheriting ICH in China, Korea, even in Europe. However, little research has been done on the role of new technologies from an interactive narrative environment respective to explore the space-person relationships. Furthermore, few have discussed that how technologies can be utilized to exhibitions on ICH in relation to audiences’ interactions. Due to this gap, the article examines time and space, and 5G technologies in an interactive narrative way providing access to ICH and identifies gaps and constraints. It also explores the possibility of digital technologies being applied to exhibition environment on ICH in order to promote its preservation and sustainability. It draws on three dimensions of the literature review based on the theories of narratology and post-narratology, developed an interactive narrative environment model for ICH exhibition, and specified how specific 5G technologies can contribute to the display of ICH, thereby contributing to the sustainability of ICH.

2 Literature Review 2.1 ICH in China CCI is new cross-sectoral and inter-departmental industry, combining with arts, culture, economy and science & technology [1]. As a branch of CCI, ICH can be considered to be a source of creativity, while creativity can be a medium to revitalize the culture [2]. It is important that ICH is a factor in maintaining cultural diversity in the face of growing globalization [3]. “An understanding of the intangible cultural heritage of different communities helps with intercultural dialogue, and encourages mutual respect for other ways of life.” [3]. According to the “UNESCO” in 2003, the “intangible cultural heritage” is “traditional, contemporary and living at the same time”, “inclusive”, “representative”, and “Community-based”, which is constantly recreated by communities and groups in response to their environment, their interaction with nature and their history [4]. The “UNESCO” divided ICH into five categories, which are: (a) oral traditions and expressions, including language as a vehicle of the intangible cultural heritage; (b) performing arts; (c) social practices, rituals and festive events; (d) knowledge and practices concerning nature and the universe; (e) traditional craftsmanship [4]. It highlights the most important character of ICH is “authentic”, and “dynamic and active” which plays a key role in maintaining cultural diversity. Social cohesion and individuals are enhanced and developed a sense of identity and belonging within a culture [4, 5]. The categories of national ICH and representative list examples of each type are shown in Table 1 below. Table 1 shows five categories classified by UNESCO used to classify the types of Chinese ICH on the UNESCO “Convention’s Lists”.

138

C. Qu et al. Table 1. National intangible cultural heritage in China [3, 9, 10] Category

Total

Representative list (Example)

a

Oral traditions and expressions

9

Hezhen Yimakan storytelling 2011; Hua’er, 2009

b

Performing arts

8

Pekng opera, 2010; Yueju Opera, 2009

c

Social practices, rituals and festive events

9

Qiang New Year festival, 2009

d

Knowledge and practices concerning nature and the universe

4

The Twenty-Four solar terms 2016 Chinese Zhusuan, 2013

e

Traditional craftsmanship

10

Wooden movable-type printing of China, 2010; Meshrep, 2010

2.2 Digital Technology for Preserving ICH Utilizing digital technologies for preserving ICH can be widely acknowledged recently, such as computer-based visualization, cultural heritage 3D visualisation projects, IT platforms, etc. [7], which are newly devised operational methods to support the growth of cultural diversity and increase international networking for promotion of safeguarding and sustainable practices of ICH. They normally reconstruct or recreates historical buildings, artifacts and environments as audiences believe they were in the past [8]. The key thing is that it should “always be possible to distinguish what is real, genuine or authentic from what is not. In this sense, authenticity must be a permanent operational concept in any virtual archaeology project [8]. An application named “civilisations AR” produced by BBC has been applied to mobile phones, in which users could immerse in the museum space to feel the authenticity (see Fig. 1). This AR (Augmented Reality) technology applied to museums can draw public attention to enrich visitors’ experience and broaden their horizons through the visual impact and abundant information provided by digital media.

Fig. 1. Application of “Civilisations AR” by BBC

A Narrative Environment Model

139

2.3 Narrative Environment Recently, individuals are provided a place where people can learn about history, culture, and other subjects through exhibitions, galleries or museums with a wealth of information in diverse fields [6]. On the basis of the audience-centered perspective, the space are encouraged to offer information in a narrative way that benefits audiences, enhancing the interactions from audiences and ICH. Therefore, to understand the relationships between space, time, and audiences, it is necessary to understand what is narrative environment, derived from the theory of narratology. “Narrative theory, or narratology, is the study of narrative as a genre.” [8]. The term narratology has been defined by some theorists in different way, but generally, these theorists explain that narratology is the study of the form and functioning of narrative. However, Amerian and Jofi (2015) argue that “narratology should make its borders larger” and need to “interact with other disciplines” reflected in the era of post-classical narratology. As Fig. 2 shows the components and elements of narrative text, which narratives are constructed and these components are related. The hierarchy identifies the two higher-levels are story and discourse, which lies at the heart of all structuralist approaches to narrative [8]. From Chatman’s classification in Fig. 2, events and existents are other vital elements of narratives, and along with existents, events are the fundamental constituents of the story [8]. He also highlights the concept of “phenomenological aesthetics” can be used to explain the distinction between story, discourse, and manifestation.

Fig. 2. Chatman’s diagram of narrative, cited from Chatman [8]

3 Narrative Environment Model for ICH Exhibition 3.1 Narrative Environment Model Figure 3 provides the narrative environment model for ICH exhibition, derived from the previous diagram of narrative from Chatman. According to the Chatman’s diagram, the

140

C. Qu et al.

narrative text includes the main attributors, which are story and discourse [8]. Therefore, in terms of ICH, the story could be considered as ICH’s content, and the ICH expression would be the discourse code. It means the form of expression can be recognized as the display of ICH. Because the vital factors of ICH is revise its “authentic” or “alive”, from the audience perspectives, the form of expression should be considered from three attributes of ICH of, which are ideology, behaviour, and substance, to interactive with audiences through an interactive narrative space. As the previous literature stated, utilizing technology must take consideration into the authenticity; therefore the “existent code” (ICH form) must have the scenario of people and context as a permanent operational concept in this model.

Fig. 3. Interactive narrative environment model for ICH exhibition

3.2 5G+Practical Contributions Table 2 shows the “5G+Virual Reality (VR), Augmented Reality (AR), Mixed Reality (MR), Holographic” technologies on the exhibition of ICH in China. In this table, 5G is supported on VR, AR, MR and holographic projection technology to restore the occurrence, development and evolution of ICH works in a narrative way, and to enhance the interaction between artworks and audiences and the entertainment of exhibitions. 5G+VR will enhance the process of virtual technology to comprehensively represent ICH skills. 5G+AR augmented reality technology enables ICH artworks to present a brand-new visual effect with the combination of reality and reality, so as to restore their active state and show the cultural connotation behind them. 5G+MR mixed virtual reality technology enables viewers to see the ICH through their eyes to measure the

A Narrative Environment Model

141

scale and orientation of objects in real life, enhancing the interaction between the virtual world and the real world. 5G+ holographic projection technology enables the threedimensional holographic projection portraits of intangible cultural heritage practitioners to be clearly presented, just like standing on the scene to show intangible cultural heritage technologies to the audience, the holographic projection realized by 5G technology at low delay and high rate will bring a new experience. The three technologies are integrated to break the limitation of time and space in the immersive space by means of linkage image, radar motion capture, and immersive digital sound effect, so as to realize the full-scene immersive experience ecosystem technology. Table 2. 5G+New technology practical possibility New technology content

New technology speciality

Possibility of new technology

5G+VR holographic 3D immerse VR system

Enhancing the process of virtual Virtual wearing experience of technology to comprehensively ICH, visitors immersing represent ICH skills. The themselves in ICH scenes 360-degree panoramic virtual simulation is a four-dimensional space for immersive viewing

5G+AR material object scanner and 3D scanner

Augmented reality technology, which superimposes real environment and virtual objects on the same screen or space in real time

ICH display and physical scan, to achieve the perfect integration of traditional culture and technology

5G+MR hybrid display

A hybrid of augmented reality and augmented reality. Using MR hybrid technology to reproduce the advantages of reality to achieve the immersive effect and interactive effect of hybrid reality technology

Viewers can see the reproduction of ICH content and conduct real-time interaction around virtual cultural relics

5G+Holographic projection

3D holographic projection can be viewed directly without auxiliary equipment. 360, 270, 180 multi - latitude representation of the object’s real 3D image

ICH documentary and theater projection. The suspended image shows the virtual ICH documentary and dramatic dance performance image through the light and shadow effect of the holographic image

4 Conclusion This article tries to develop an interactive narrative environment model utilizing new technologies with 5G technology. The theoretical innovation of ICH exhibition model

142

C. Qu et al.

of interactive narrative environment, the theoretical innovation of science and technology and narratology, and the practical innovation of science and technology and culture have analytical identified in this research. First, it overviewed Chinese ICH at present, and subsequently it based on narrative theories but beyond the traditional narrative structure of exhibition, employing the narrative model of “post-classical narrative”, and achieves the fusion of viewer and space, creating a new model of interactive narrative environment model for ICH exhibition through 5G technology. Lastly, the practical possibilities of 5G with interactive media (VR, AR, MR, Holographic) has been conducted from “text” to “graphics”. These contributions and practical possibilities may serve as a guild line for the inheritors of ICH, researchers, artists, curators, and different stakeholders in sustaining the status of WHS. Acknowledgements. This research is financially supported by the Educational Department of Liaoning Province. Project:《The Theoretical and Practical Research of Intangible Cultural Heritage in Liaoning Province Based on the “Narrative Environment” Theory under the 5G Era》 (Project number: No. J2020079).

References 1. Wang, Y., Zheng, L.: Development research of cultural creative industry based on the intangible cultural heritage in Hangzhou. In: 2008 9th International Conference on Computer-Aided Industrial Design and Conceptual Design, Kunming, pp. 1293–1297 (2008). https://doi.org/ 10.1109/caidcd.2008.4730802 2. Tan, S.-K., Lim, H.-H., Tan, S.-H., Kok, Y.-S.: A cultural creativity framework for the sustainability of intangible cultural heritage. J. Hosp. Tour. Res. 44(3), 439–471 (2020) 3. UNESCO: China and the 2003 Convention. https://ich.unesco.org/en/state/china-CN. Accessed 15 June 2020 4. Hahm, H., Lee, J., Jeong, S., Oh, S., Park, C.S.: A digital solution and challenges in the safeguarding practices of intangible cultural heritage: a case of ‘ichngo.net’ platform. In: Proceedings of the 2020 2nd Asia Pacific Information Technology Conference, January 2020, pp. 94–99 (2020) 5. Kim, S., Im, D., Lee, J., Choi, H.: Utility of digital technologies for the sustainability of intangible cultural heritage (ICH) in Korea. Sustainability 11 (2019). https://doi.org/10.3390/ su11216117 6. Park, S.C.: ICHPEDIA, a case study in community engagement in the safeguarding of ICH. Int. J. Intang. Heritage 9, 69–82 (2014) 7. Ioannides, M., Magnenat-Thalmann, N., Papagiannakis, G.: Mixed Reality and Gamification for Cultural Heritage. Spinger, Cham (2017) 8. Amerian, M., Jofi, L.: Key concepts and basic notes on narratology and narrative. Sci. J. Rev. 4, 182–192 (2015). https://doi.org/10.14196/sjr.v4i10.1927 9. UNESCO: What is Intangible Cultural Heritage? https://ich.unesco.org/en/what-is-intang ible-heritage-00003. Accessed 15 June 2020 10. Alivizatou-Barakou, M., Kitsikidis, A., Tsalakanidou, F.: Intangible Cultural Heritage and New Technologies: Challenges and Opportunities for Cultural Preservation and Development 6, 59–67(2017)

Application Study of VPN on the Network of Hydropower Plant Wenju Gao(B) Army Academy of Armored Forces, Changchun, Jilin, China [email protected]

Abstract. In this paper, the concept, as well as the advantages and the application areas of VPN (Virtue Private Network) are introduced; the security technology of VPN are discussed; a scheme about information exchange with safety among the stations of hydropower plant by means of VPN is put forward; and last, the process of establishing VPN by Windows is introduced in detail. Keywords: VPN · The information network of hydropower plant · Tunneling technique · L2PT · Network security

1 Introduction With the continuous deepening of information construction in China, especially the development of computer network in large state-owned enterprises, more and more information needs to be transmitted by means of network. Although the enterprise internal comprehensive information network of Northeast Power Grid Company is a wide area network system physically isolated from the Internet, which largely meets the needs of enterprises, many subordinate units still need to keep secret. However, it is hoped that while connecting to the integrated information network, some important internal information like notice, plan, etc. which can only be seen by the staff of the unit can be transmitted on the network [1]. The private network constructed by using public network is called virtual private network. The public network used to build VPN includes Internet, frame relay, ATM, etc. VPN built on the public network provides security, reliability and manageability just like the existing private network. The concept of “virtual” is relative to the construction of traditional private network. For WAN connection, the traditional networking is realized by remote dial-up connection, while VPN is realized by using the public network provided by the service provider.

2 Characteristics of VPN 2.1 Wide Area of Intranet VPN can interconnect the main power plant with the branches and business points scattered around, for example, Baishan power plant is a hydropower plant with three © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 143–148, 2021. https://doi.org/10.1007/978-3-030-62746-1_21

144

W. Gao

power stations. Specifically, there are two hydropower stations in Baishan town and one hydropower station in Hongshi town in Huadian city [2]. The general plant is located in Huadian city. Baishan power plant can build the internal network of the unit in this way, so that the personnel scattered in different regions and outside the unit can use the internal network as safely and conveniently as in their own offices. 2.2 Reduce Operation and Management Costs With the emergence of VPN, the operation cost of Wan has been reduced. With the wide area of Intranet, its importance is more prominent. 2.3 Enhanced Security VPN is verified by using point-to-point protocol (PPP) user level authentication method, which is enforced by VPN server. For sensitive data, VPN connection can be used to separate highly sensitive data servers through VPN server. Users who have proper permissions on the Intranet can set up VPN connection with VPN server through remote access, and can access resources in sensitive department network. 2.4 Good Scalability VPN supports the most widely used network protocols. Clients in IP, IPX and NetBEUI can use VPN without any difficulty. Therefore, applications that rely on special network protocols can be run remotely through VPN connection; in addition, VPN can support multiple types of transmission media, which can meet the requirements of high-quality transmission and bandwidth increase for new applications such as voice, image and data transmission at the same time.

3 Classification and Use of VPN According to different needs, different types of VPN can be constructed. VPN is usually divided into three types: remote access virtual network (access VPN), internal virtual network (intranet VPN) and extended virtual network (extranet VPN). 3.1 Remote Access Virtual Network Personnel may need to visit the intranet of the unit in time when they are on business trip. 3.2 Internal Virtual Network Intranet VPN is a network that connects the LAN of each branch of an organization through public network. This type of LAN to LAN connection brings the least risk, because it is generally considered that each branch is reliable. Intranet is the extension

Application Study of VPN on the Network of Hydropower Plant

145

or alternative form of traditional private line network or other enterprise network. This article applies this type of VPN [3]. The essence of using IP network to build VPN is to build VPN Security tunnel between routers through public network to transmit users’ private network data. The tunnel technologies used to build this VPN connection include IPSec, GRE, etc. Combined with the QoS mechanism provided by the service provider, the network resources can be used effectively and reliably to ensure the network quality. VPN based on virtual circuit technology of ATM or frame relay can also achieve reliable network quality, but its disadvantage is that the interconnection area has greater limitations. On the other hand, building VPN based on Internet is the most economical way, but the quality of service is difficult to guarantee. When planning VPN construction, enterprises should weigh the above public network schemes according to their own needs. 3.3 Extended Virtual Network Extranet VPN means to use VPN to extend the internal network to other units. Such extranet construction and maintenance is very expensive, because of the wide distribution of partners and customers.

4 Realization of Virtual Private Network 4.1 Security Technology of Virtual Private Network As the private information is transmitted, VPN users are more concerned about the security and confidentiality of data. At present, VPN uses four technologies to ensure its security, which are tunneling technology, encryption & decryption technology, key management technology, user and device authentication technology. Tunnel technology is the basic technology of VPN, just like point-to-point connection technology. It establishes a data channel (tunnel) in the public network (such as the enterprise internal integrated information network of Northeast Power Grid Company) to let the data packets transmit through this tunnel. Tunnel is generated by tunnel protocol, which is divided into two or three layers [4]. The second layer is to encapsulate all kinds of network protocols into PPP, and then package the whole data into tunnel protocol. The data packets formed by this two-layer encapsulation method are transmitted by the second layer protocol. The second layer of tunnel protocol includes L2F, PPTP, L2TP, etc. L2TP protocol is the current IETF standard, which is formed by IETF integrating PPTP and L2F. The third layer tunnel protocol is to install all kinds of network protocols directly into the tunnel protocol, and the data packets formed depend on the third layer protocol for transmission. The third layer of tunneling protocols includes VTP, IPSec, etc. IPSec (IP Security) consists of a group of RFC documents. It defines a system to provide services such as security protocol selection, security algorithm, and key used by services, so as to guarantee security at the IP layer. VPN is connected through dial-up, by sharing the tunnel of the enterprise internal comprehensive information network of Northeast Power Grid Company. It sends by one router on LAN, and then to another router on LAN, so that PPP packet flow can be transmitted [5]. Its essence is to replace the real dedicated lines with tunnels.

146

W. Gao

Encryption and decryption technology is a more mature technology in data communication. VPN can directly use the existing technology. The key management technology is mainly about in how to transfer the key safely on the public network without being stolen. The current key management technology includes SKIP and ISAKMP/Oakley. SKIP transmits keys on the network by using Diffie-Hellman’s algorithm; in ISAKMP, both parties have two keys, which are used for public and private purposes respectively. The most commonly used authentication technology is user name and password or card authentication. 4.2 Implementation of Virtual Private Network At present, the internal comprehensive information network of Northeast Power Grid Company has completed the full coverage of the basic units, providing a better information interaction platform for the basic units, but because many units and subordinate units are widely distributed in the region [6]. For example, Baishan power plant headquarters is located in Huadian City, and the three power stations are located in Baishan town and Hongshi Town, respectively. The distance between the plant headquarters and the subordinate power stations is far, which leads to the slow promotion of online office and paperless office. If we use the above-mentioned internal virtual network technology, we can easily connect several small LANs which are distributed in different regions and belong to the same unit into a large LAN, and realize the interconnection of all branches in the enterprise [7]. Although the information is transmitted through the internal public network of Northeast Power Grid Company, it can guarantee the security and confidentiality of information transmission. The system is shown in Fig. 1.

Fig. 1. Application of VPN in the enterprise internal integrated information network of Northeast Power Grid Company

The specific process of establishing VPN in Windows 2007 server is: first, install PPTP on Windows 2007 and input the number of VPNs supported by the server, then add VPN device as the port of RAS, configure encryption and verification methods, and then configure TCP/IP protocol for VPN tunnel. Finally, RAS routing is configured so that PPTP packets pass through the server to the network [7]. VPN device encryption adopts the special core password algorithm, and password management adopts the corresponding password management system. The composition

Application Study of VPN on the Network of Hydropower Plant

147

structure and IP address planning of the system are as follows: LAN IP of central contact of the factory Department is 100.100.0.1, the subnet mask is 255.255 255.0, i.e. 100.100.0.0 network segment, addresses of each power station network segment are 100.100.1.0 to 100.100.3.0, IP addresses of VPN devices of each power station are 100.100.1.1 to 100.100.3.1, and masks are 255.255.255.0. Each VPN device is composed of Windows 2007 system, and the configuration process is as follows: a. Install the PPTP protocol on the windows 2007 server, and set the number of VPN private network channels to 2. These two channels are used to connect to the central point server. b. Install VPN routing and RAS management software. When the installation is completed, the routing and RAS admin items will appear in NT program items. c. Add VPN dial-up interface in dial-up network, and configure user name, password, running protocol and security authentication. d. According to the requirements of the password system, configure the encryption relationship table between subnets. e. For the configuration of routing options, we select static routing for configuration, where the destination IP address of VPN routing is 100.100.0.0 (mask is 255.255.0.0), that is, the route to the central contact. Here, the VPN IP address pool of the central point equipment is 100.100.100.0 to 100.100.100.255. The gateway of VPN routing in each power station is the first IP address of the central point VPN PPTP pool address pool, namely 100.100.100.1. Interface is the added VPN dial-up interface [8]. The route to the integrated information network is 0.0.0.0 (mask is 0.0.0.0), the gateway is the Ethernet port address of each power station, and the interface is the network card of the machine. Create a user for dialing in the device NT domain. Configuration process of central contact VPN device: The configuration process is basically the same as that of VPN devices in each power station, which means, the number of VPN dedicated network channels added is the sum added by each power station. To create VPN interfaces to each power station, and configure static routing for each interface. Also create each VPN user on the domain user manager of Windows 2007. When the configuration of VPN equipment in the central point and each power station is completed, VPN connection can be carried out. In addition, it should be noted that the IP address of the client machine on each power station network segment should be configured as the planned address of the power station VPN, rather than the integrated information network address or others [9]. Only in this way can the client machine connect to the central contact through the local VPN device for resource access. Through the above process, VPN can be easily established, and has good scalability and flexibility. Due to the establishment of VPN, hydropower plant enterprises can benefit from the following aspects, which are embodied in the realization of network security, simplification of network design, reduction of cost, easy expansion and full control of Initiative (for example, enterprises can give dial-up access to ISPs, and be responsible

148

W. Gao

for the inspection and access rights of users). The establishment of VPN also supports the emerging applications (such as IP fax) [10].

5 Conclusion VPN combines the advantages of private network and public network, allowing the unit with multiple sites to have a hypothetical completely proprietary network, while using the public network as the communication line between their sites. It ensures its security through reliable encryption technology. It is a low-cost and efficient scheme to provide reliable services in unreliable networks. With the development of IP technology and mobile communication technology, various technologies have emerged to realize VPN services, and constantly meet the requirements of users’ security, confidentiality, efficiency and flexibility. Except for the enterprise internal comprehensive information network of Northeast Power Grid Corporation, most of the other network systems in our country are based on the TCP/IP protocol. VPN system can build a special network system for each business department to meet their own needs. Therefore, it has a broad application prospect.

References 1. Davis, C.R.: IPSec; VPN Security Implementation, pp. 14–15. Tsinghua University Press, Beijing (2019). Translated by Zhou Yongbin, Feng Dengguo, et al. (in Chinese) 2. Li, M.: MPLS VPN networking simulation and application design. Luoyang Electro Optic Control 6, 45–48 (2009). (in Chinese) 3. Yang, G.: Baishan power plant’s generating capacity reaches a record high [OL] (2015). http:// finance.sina.com.cn/. (in Chinese) 4. Yu, C.: Computer Network and Information Security Technology. China Machine Press, Beijing (2018). (in Chinese) 5. Sun, W.: VPN tunnel technology. Comput. Appl. Res. 17(8), 55–58 (2010). (in Chinese) 6. Brown, S.: Building a Virtual Private Network. People’s Post and Telecommunications Press, Beijing (2009). Translated by Dong Xiaoyu, Wei Hong, Ma Jie, et al. 7. Chen, Y.: Application of VPN technology in hospital network expansion. Comput. Appl. Res. 28(4), 35–36 (2017). (in Chinese) 8. Wan, L.: Research on firewall technology - implementation of virtual private network. University of Electronic Science and technology, Chengdu (2003). (in Chinese) 9. Gleeson, B., Lin, A., et al.: A Framework for IP Based Virtual Private Networks. IETF RFC 2764, February 2000 10. Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. IETF RFC3775, June 2004

Prediction of Technology Trend of Educational Robot Industry Based on Patent Map Analysis Yue Wu(B) and Jian Fang Jilin Engineering Normal University, Changchun, Jilin, China [email protected]

Abstract. This paper starts with the research of the education robot industry, conducts a detailed investigation, analysis and summary from the theory, analysis method and application of education robot, patent map research at home and abroad and other aspects. By collecting relevant patents of educational robots at home and abroad, the research status of educational robots is understood. Apply the research of patent map to the education robot technology, modify and supplement the existing patent map appropriately, dig the related patent literature of education robot deeply, draw the detailed patent map of education robot at home and abroad, and analyze it. This paper summarizes the research on hot technology of educational robot, explores the key technology of educational robot, and predicts the life cycle of key technology, so as to predict the key technology and hot technology of educational robot. Keywords: Educational robot · Patent map · Technical trend prediction

1 Introduction According to a variety of policies published in recent years around the world, the use of artificial intelligence technology to promote the reform and innovation of the education system has attracted the attention of countries around the world. In the future, under the background of the rapid development of education technology innovation and other aspects, education robots will develop rapidly. Had the state of education innovation, gradually pay attention to scientific and technological innovation, robot education has begun to gradually into the primary and secondary schools, let children early exposure to advanced interesting robot, by developing education function of the robot, the excavation of the intelligent robot education value, can effectively promote the innovation in education, promote the education reform and modernization of education, innovation and practical ability to improve primary and middle school students. In this paper, the application for a patent for nearly a decade of education robots at home and abroad to make objective statistical analysis, and then make a comparison on the development of future education robot reasonable life cycle prediction about the future of education robot production technology trends do detailed analysis, to make up for the market of education robot of blank in this field, provide the guide for the development of education robot in the future. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 149–155, 2021. https://doi.org/10.1007/978-3-030-62746-1_22

150

Y. Wu and J. Fang

2 The Development Status of Educational Robots At first, educational robots were promoted and developed mainly through competitions. Later, they began to focus on teaching. However, competition robots still occupy a large share of the educational robot market. Although education robot in China started relatively late compared with abroad, but it has a very good development trend, our country has attached great importance to education in China since ancient times, Beijing, on average, a family for children education the teaching cost has been beyond the onethird of household spending, so good education product there will be a huge market demand in our country. According to the China Academy of Commerce, the global market for educational robots totaled about $100 million in 2015 and is growing at a rate of about 20 percent annually. In 2017, the scale of global education machine market reached 850 million US dollars, with a year-on-year growth of 14.4%, and the overall market showed a steady rise. It is expected that the global education robot market will reach 970 million US dollars in 2018, with a year-on-year growth of 13.5%, and reach 240 million US dollars in 2020 [1]. According to the statistical data of Prospective Industry Research Institute, Since 2009, the number of patent applications for educational robots in China has been on the rise steadily. The number of patents filed in 2016, 2017 and 2018 was the highest, reaching 586 in 2017. It can be seen that China’s educational robots have a good development trend with unlimited potential.

3 Comparative Analysis of Key Technology of Education Robot Patent 3.1 Application of Patent Analysis Method in Technology Foresight Foresight (Technology Foresight) is proposed by the United States to combine science and technology and economic information, and to optimize the information integration of strategic management method, has been widely used in many countries today. There are also many methods for technology prediction. Taking the patent literature research method as an example, the patent analysis method using patent literature for technology foresight is also diversified. Firstly, the management level and technology level can be analyzed; secondly, the hot and cutting-edge technologies can be found through the statistics of patent reference profit frequency and the patent clustering network map; finally, the hot technologies and the forefront of technology can be found through the clustering layout of patent topics, and then the technology can be predicted [2]. At present, technology foresight has been widely used in the world, which provides a decisive basis for national strategic decision-making. With the continuous improvement of market demand for technology, technology is also in constant innovation. Therefore, enterprises need to do market research in a period of time, and make reasonable adjustments to the research and development of technology, in order to meet the market demand. First of all, enterprises can analyze the patent of relevant technology to understand the current development situation of this technology in the market, its related hot

Prediction of Technology Trend of Educational Robot Industry

151

technologies, and what aspects this technology is applied to, so as to improve the market competitiveness. Secondly, the history and current development of this technology should be investigated in order to find the opportunity for technological innovation. Finally, find and solve the existing technical problems, so as to seize market opportunities. It can be seen that the analysis of patent literature is particularly important and has become one of the important methods of technology foresight [3]. 3.2 Comparative Analysis of Patent Technology Map Between China and World Education Robot Industry Robot in China started in the early 1970s, and slow development in recent years, the Chinese government attaches great importance to the development of robotics, and launched a series of policies to promote the development of robot industry, on the basis of the development of industrial robots, vigorously develop education robot, the current Chinese education robot with the world of education robot patent technology in the application field also has a lot of. Domestic educational robots such as Lego, Alpha, Chigo and BDS are typical representatives, while foreign educational robots such as NAO and MINIROB0T are typical representatives. Another important part mainly focuses on the education system. The leader in this aspect is Wonder Workshop. In this aspect, although their hardware technology is not as perfect as the previous part, it can be clearly seen that they combine the hardware system well with educational learning software [4]. This is more conducive to the user’s learning, and can also better increase the user experience. China is basically similar to the world in terms of applied technology. However, the similar part is generally the basic function of the robot, involving B25J17, B25J15 and B25J9, and the IPC classification number in this aspect refers to the basic technologies such as mechanical arm, mechanical wrist, mechanical finger and mechanical clip. Moreover, the proportion of these technologies is still quite large, accounting for 1/3. Therefore, it is not difficult to find that the development of educational robots pays more attention to institutional inventions such as the appearance of institutions [5]. In the future, the patent of educational robot will further strengthen the new creation, and the research on educational robot will lay more emphasis on artificial intelligence, which is also a new hot spot in the global scope.

4 Technology Trend Forecast of Educational Robot Industry 4.1 Theoretical Model S type curve is a kind of long-term projections for growth curve model, and forecast data changes over time in accordance with the law of growth curve, namely the things happen through four stages, development, maturity, saturation, according to the principle of growth curve can change the process for a technology to use appropriate regression model analysis method, to obtain its growth curve, prediction technology in phase, the S curve mainly includes two kinds: one kind is symmetrical S curve, according to the Logistic curve; An asymmetric type of S curve is called the Gomper-TZ curve [6].

152

Y. Wu and J. Fang

Logistic curve is more suitable for the study of educational robot technology in this paper. The curve equation is as follows: y=

k 1 + a ∗ e−bx

(1)

In the formula, Y is the number of patents accumulated; A is the slope of the S curve, which is the growth rate of the S curve; B is the time point of midpoint in the growth curve; K represents the saturation level of growth, namely saturation, which is defined as [K × 10%, K × 90%] and is also the time length t required in the growth and maturity stages. 4.2 Education Robot Industry Patent Technology Life Cycle Forecast Education robot patent technology life cycle prediction data are based on the number of patent applications every year education robot industry, calculate every year in turn education robot application for a patent for the total amount, with an annual cumulants as dependent variable, an application for a patent for the year as the independent variable, Matlab software will each year accumulative total amount as a Logistic regression model, finally it is concluded that the three unknown parameters and S type curve equation, so that the prediction research of patent technology [7]. The prediction types in this paper are divided into two categories. Firstly, the patent technology cycle of educational robot industry in the world is predicted, and then the patent technology cycle of educational robot industry in China is predicted. According to China Patent Network, the annual patent application volume of Education robot in China obtained by soopat patent network search engine is shown in Fig. 1.

3500 3000 2500 2000 1500 1000 500 0 1989 1991 1993 1995 1997 1999 2001 2003 2005 2007 2009 2011 2013 2015 2017

Fig. 1. The number of patent applications for educational robots in China per year

Prediction of Technology Trend of Educational Robot Industry

153

According to China Patent Network, the annual patent application volume of Education robot in China obtained by soopat patent network search engine. Based on Logistic Growth, taking the number of patents accumulated as the vertical axis and the year as the horizontal axis (time unit, year minus 1988), and use matlab software to each year accumulative total amount as a Logistic regression model, it is concluded that the three unknown parameters (see Table 1) and the scatter of existing data regression analysis get fitting curve of the Fig. 2, on the basis of this paint education robot S graph (see Fig. 3) [8]. Table 1. Value of regression model parameters Parameter The values K

11536

a

2821400

b

0.4626

Fig. 2. Logistic regression fitting curve

Fig. 3. Education robot patent technology cycle S curve

154

Y. Wu and J. Fang

The four cycles of educational robot patent technology can be inferred from the graph, as shown in Table 2. Table 2. Description of the growth stage of educational robotics Technology Birth stage of technology

Technical growth stage

Technology maturity stage

Stage of technological decline

1989–2014

2015–2023

2024–2034

2035–

5 Key Technologies for the Future of the Education Robot Industry Using China hownet analysis of the patent document can be related to education robot patent literature search and the center frequency and degree of high frequency keywords to search, in measuring visual analysis, to analyze all the retrieval, can according to the literature on patent issuing year distribution, main keyword distribution, subject distribution, distribution of the major categories, and can be part of literature pie chart and histogram for patent analysis [9]. The results are shown in Fig. 4.

Educational robot The robot Appearance design Artificial intelligence Design points Utility model Robot body Robotics Intelligence education The controller Anatomical site Mechanical arm The bluetooth module display fittings The output end Support plate Storage unit The server Connecting rod Voice interaction Recognition module Deck machinery The host controller

120 100 100 80 74 80 45 40 60 40 24 18 12 10 9 7 6 6 5 5 5 20 4 4 4 4 4 4 4 4 0

High frequency key word frequency table for education robot Fig. 4. High frequency keyword frequency of education robot

In the field of educational robot, key words: robot frequency of 100 times is the first. About 20% of the key words in the whole field of educational robotics. The robot was designed for 80 times and 74 times, accounting for 30% of the proportion of education robots. Artificial intelligence for 45 times, design essentials for 40 times, practical types for 24 times, robot body for 18 times, robot technology for 12 times, intelligent education

Prediction of Technology Trend of Educational Robot Industry

155

for 10 times, these 6 aspects are the technologies of educational robot technology, which account for 30% of the proportion of educational robot technology. Technologies related to educational robots include controllers, anatomical sites, robotic arms, regulators, Bluetooth modules, display screens, connectors, output terminals, support plates, storage units, servers, connecting rods, voice interaction, recognition modules, deck machinery, master controllers, etc., which account for 20% of educational robotics. According to the analysis of high-frequency keywords in the field of international educational robotics, the research focuses on educational robotics, robotics, appearance design and artificial intelligence [10].

6 Conclusions Based on the detailed comparison of the relevant educational robot industry patents in China and the world, and the prediction of the future key technologies of educational robots, this paper comprehensively presents the patent map of educational robots in China. In order to promote the healthy development of China’s education robot industry, the education robot related industry is developing rapidly. Both at the world level and in China, educational robot patent applications in recent years are in the stage of rapid growth, and the trend of continuous growth. Although China has occupied a place in the world’s total patent applications, but with the development of the past few years, the total number of Chinese patent applications in the next few years will still increase substantially, will certainly maintain its place in the world. Acknowledgement. Jilin Science and Technology Development Project《Patent analysis and strategic research of educational robot》(Project number: 20190802025ZG).

References 1. Zhao, S., Zhang, Y.: Exploration and practice of robot application in the field of education. Robot Technol. Appl. (01), 39–43 (2016) 2. Huang, R., Liu, J.: Development status and trend of educational robots. Mod. Educ. Technol. 27(01), 13–20 (2017) 3. Ge, Y., Li, W.: Design and application of Internet of Things education robot based on experimental teaching. Exp. Sci. Technol. (06), 18–22 (2015) 4. Hou, J.: Current situation and thinking of robot education in schools. Educ. Technol. 15(12), 85–87 (2016) 5. Li, Z., Cao, Y.: Development status and future trend of speech recognition patent technology. Chin. Invent. Pat. 14(S1), 55–59 (2017) 6. Yu, Y.: History and prospect of machine learning based on artificial intelligence. Electron. Technol. Softw. Eng. (4), 129 (2017) 7. Wu, M., Zhou, Y.: Introduction to language recognition technology. Mod. Comput. (19), 36–40 (2019) 8. Zhang, Z., Zhu, T.: Patent situation analysis in robot field. Chin. Invent. Pat. (04), 40–42 (2008) 9. Wu, Y.: Current situation, practice, reflection and prospect of robot education from the perspective of machine intelligence. J. Distance Educ. 36(04), 79–87 (2012)

Coal Handling System of Power Plant Based on PLC Zhijie Zhang(B) School of Electrical Engineering, University of Jinan, Jinan, Shandong, People’s Republic of China [email protected]

Abstract. The main task of this design is to process coal from coal source into pulverized coal and supply it to the original coal bunker for combustion and power generation. In the design, Siemens CPU315-2DP is used as the main control unit to control all the components of the coal transportation system of the power plant. The PROFIBUS-DP communication method is used to implement the distributed control system through the hardware configuration of the ET200M distributed I/O site, and the distributed control area is scattered. Various equipment. While realizing the system’s reverse coal flow sequence start, downstream coal flow sequence stop, fault interlock stop, severe fault emergency stop, automatic coal blending and other functions, it solves the serious problems of this type of system, such as the coal falling pipe is easy to block Problem; the problem that the conveyor belt is easy to tear and collapse; the problem of the deviation of the conveyor belt. After debugging, all the above functions have been realized. Keywords: Siemens PLC · PROFIBUS-DP communication · Distributed I/O

1 Introduction All along, the development level of the domestic power industry lags behind that of developed countries in the world to a great extent. The utilization rate of automation technology in the entire industry is low, the power generation capacity of a single generator is small, and the output of electrical energy needs to consume more coal. Poor reliability and stability, and the grim situation facing environmental sustainable development are all urgent issues that need to be resolved. Among them, the problems of automation and low electrification, small stand-alone power generation capacity, and high coal consumption for power supply are the bottlenecks in the development of the power industry, which severely restrict and restrict the progress of my country’s power industry [1]. This requires us to study and apply new high-efficiency power grid technology, improve the reliability of power grid operation, reduce power generation energy consumption, increase power output, and make the greatest efforts to reduce coal consumption [2]. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 156–162, 2021. https://doi.org/10.1007/978-3-030-62746-1_23

Coal Handling System of Power Plant Based on PLC

157

2 Overall Design of Coal Transportation System 2.1 Design Task Analysis The design requires the completion of the overall hardware design and software design of the power plant’s coal transportation system to produce a system that can solve the actual problems such as low automation, tearing and collapsing of the conveyor belt, and clogging of the coal drop pipe. The design uses Siemens CPU315-2DP as the main control site, ET200M distributed remote I/O to achieve distributed control, and centralized management of the equipment in various places. In the design, the sensor detection technology is used to detect the running state of the conveyor belt and the coal bunker level, so as to monitor and control through the PLC in real time to ensure the stable operation of the system. The optimized design of software and hardware makes the whole system more reliable, and realizes the functions of sequential start and stop, fault interlock stop, and emergency stop of severe faults. In the entire design process, electrical wiring diagrams need to be drawn, hardware selection and software writing, debugging and integration of the entire system, and ultimately system requirements [3, 4]. 2.2 Design of the Overall System Plan Hardware part: Use Siemens PLC as the main control station, ET200M cooperates to realize remote distributed control, use sensors such as photoelectric switch, deviation switch, resistive coal level sensor to detect potential failure points, PLC reacts to all detection information, And execute the control plan to make the system run strictly in accordance with the requirements of PLC. Software part: write high-quality control programs to improve the stability of the software, so that the system can achieve various functional requirements stably and efficiently, quickly analyze the fault information, and make accurate responses. The photoelectric switch sensor is used to detect the running position of the conveyor belt to make it work within the normal range [5]; the deviation switch is used to detect the deviation state to avoid the occurrence of heavy equipment failure; the resistance coal level sensor is used to detect the coal level, and the coal level is started according to the coal level [6]. Stop the program to realize automatic coal blending. Finally, a good control effect is achieved. The upper computer part: configure the power control and PLC, control the resources of the PLC, realize the functions of automatic start and stop, fault interlock stop, emergency stop of severe faults, etc., and record the data, make an alarm record of the fault, and output Access database, information can be queried by accessing the database through the network [7, 8]. The overall control structure of the system is shown in Fig. 1.

158

Z. Zhang

PC PROFIBUS CPU3152DP PROFIBUS

ET200

ET200

ET200

ET200

1#

2#

3#

4#

Fig. 1. Overall control structure of the system

3 Hardware Circuit Design System hardware equipment is the basis on which the system depends, and strict hardware selection is required. It is essential to design reliable electrical circuits. This chapter analyzes and studies the hardware design, and finally designs a complete set of good hardware configuration [9]. 3.1 PLC Selection As the control unit of the system, PLC operates and monitors the whole process of the system control. Whether the PLC main controller is good or not is closely related to the reliability, safety, production efficiency, production cost and other issues of the overall system operation, so it is very important to choose a suitable PLC main controller. Siemens CPU315-2DP integrates DP master-slave interface and MPI interface, has outstanding communication capabilities, easy to implement distributed structure, userfriendly interface, flexible operation mode, has a huge upgrade space, without adding any hardware equipment Under the premise of completing more complex tasks. PROFIBUS and MPI communication make communication networking simple and easy. Modular programming makes programming more flexible and can solve many complex tasks. 3.2 Distributed I/O Selection This design uses distributed I/O to directly control the scattered devices in various places, and uses PROFIBUS-DP communication to communicate with the host CPU for information transmission. In all distributed I/O, ET200M can configure all modules of S7-300 PLC, which is easy to use, high efficiency, and has better scalability for more complex tasks [10].

Coal Handling System of Power Plant Based on PLC

159

3.3 Selection of Anti-tear Sensor In the design and research of the entire coal transportation system, the belt conveyor of coal should be regarded as the key design and implementation process. During the movement of the belt conveyor, problems such as tearing or collapsing of the belt occur from time to time. In this design, sensor detection is used to determine the real-time running state of the conveyor belt, and the PLC reacts. 3.4 Selection of Anti-deviation Sensor During the operation of the system, the conveyor belt will slip and run abnormally, which will cause serious problems such as belt deviation. This design uses a deviation switch to detect deviation information. When the deviation reaches a certain angle, the output level triggers an emergency stop signal to avoid serious deviation.

4 Software Design The coal transportation system of the power plant in this design is different from the traditional coal transportation system. The control aspect is to complete the automatic control of the equipment in the system by writing a PLC program to complete the coal supply and supply task of coal-fired power generation. The order of system automatic start and stop, manual start and stop, automatic coal blending, fault interlock stop, and monitoring control requirements must comply with the principle: after the manual or automatic start signal is issued, the equipment in the PLC program control system extends in the direction of reverse coal flow Start in time sequence; after the automatic or manual stop signal is issued, all the equipment in the PLC program control system will stop according to the coal flow direction delay sequence; the system will automatically distribute coal according to the upper and lower limits of coal level detection, when the upper limit is reached, the system will be shut down, and when the lower limit is reached, Start the system; when one or more equipment failures occur in the system, immediately stop the failed equipment and all the equipment upstream of the failed equipment through interlock control; When a major accident such as an emergency stop, severe deviation, belt tear or collapse occurs, Forcibly stop all equipment in the system. The overall structure of the software is shown in Fig. 2.

160

Z. Zhang

Reverse start

automatic

Sequential start

Failure interlock stop

Interlock emergency stop

Manual

Fig. 2. Overall structure of the software

In the process of programming, it is necessary to set symbols for the I/O points used, and give simple and clear symbol names such as function blocks, storage units, timers, etc., so as to facilitate the staff to consult the program. The I/O points used in this design are 70 points, each point is defined with a simple and easy to understand symbol name, and an explanation is given.

5 Host Computer Design During the operation of the system, due to the occurrence of various problems such as wear, aging and emergency conditions of the equipment, the system will inevitably be damaged or malfunction. This requires the staff to be able to find and solve the system problems in a timely manner and understand the operation status of all equipment in real time. The best way to prevent emergencies. In this design, the system monitoring adopts the force control networking monitoring mode, which is monitored through force control and PLC configuration. It monitors, starts and stops each remote I/O site, runs the conveyor belt conveyor, and each auxiliary conveyor equipment to monitor the operating status. Record data. When a fault occurs, an alarm message is issued to warn technicians to find and deal with it in time. And can record data and alarm information, output Access database, information can be checked through the network.

6 System Debugging The first is hardware debugging, first verify the detection accuracy of the sensor. When detecting the photoelectric pair tube, use an oscilloscope to observe the change of the output level and the corresponding output voltage value when there is no object in front. The detection result photoelectric switch can reliably output a high level of about 23 V and a low level of about 1 V, and can accurately and reliably determine whether an object exists. The same detection method is used when detecting the deviation switch and the resistance type coal level detection sensor. The detection result of the deviation switch can stably output a high level of about 21 V and a low level of about 0.8 V, which can accurately and reliably determine the conveyor belt Whether to go off course. The detection result of the resistance coal level sensor is that it can stably output a high level of about 22 V and a low level of about 0.8 V, which can stably and accurately detect whether

Coal Handling System of Power Plant Based on PLC

161

the coal level reaches the limit. The start-stop debugging of the equipment adopts a motor simulation experiment, which controls the contactor coil through the digital output point, and the coil controls the power supply of the motor. The experimental result is that the motor can be accurately started and stopped, that is, the equipment is started and stopped. The hardware debugging diagram is shown in Fig. 3.

Fig. 3. Hardware debugging diagram

In terms of software debugging, online debugging and simulation of the program, automatic start and stop, fault interlocking, emergency stop for severe faults, automatic coal blending and other functions have been realized. The software simulation is shown in Fig. 4. The functions realized by the power control host computer are basically the same as the system program. In addition, it also has an alarm function and a data record storage function

162

Z. Zhang

Fig. 4. Software simulation diagram

References 1. Escobar-Alvarez, H.D., Ohradzansky, M.: Research on integration and development of intelligent transportation and smart city construction. Digit. Commun. World 166(10), 119–210 (2018) 2. Guerrero, J., Torres, J., Creuze, L.L., Peng, D.: Research and application of smart city transportation network system. Comput. Technol. Dev. 35(1), 150–160 (2019) 3. Abolvafaei, M., Ganjefar, S.: Overview of key technologies of intelligent transportation system in construction of smart city. Renew. Energy 139(2), 1437–1446 (2019) 4. Su, S.: On the development trend of intelligent transportation. Heilongjiang Transp. Sci. Technol. 9(2), 280–281 (2017) 5. Amit, K.K.C., Jacques, L.: Discriminative and efficient label propagation on complementary graphs for multi-object tracking. IEEE Trans. Pattern Anal. Mach. Intell. 39(1), 61–68 (2017) 6. Conesa, A., Madrigal, P., Tarazona, S., et al.: A survey of best practices for RNA-seq data analysis. Genome Biol. 17(1), 181–185 (2018) 7. Mareda, T., Gaudard, L., Romerio, F.: A parametric genetic algorithm approach to assess complementary options of large scale wind-solar coupling. IEEE/CAA J. Autom. Sinica 4(2), 260–272 (2017) 8. Planet, P.J., Parker, D., Cohen, T.S., et al.: Lambda interferon restructures the nasal microbiome and increases susceptibility to Staphylococcus aureus superinfection. Comput. Knowl. Technol. 7(1), 111–115 (2018) 9. Sartoris, B., Biviano, A., Fedeli, C., et al.: Next generation cosmology: constraints from the Euclid galaxy cluster survey. Mon. Not. R. Astron. Soc. 459(7), 968–974 (2019) 10. Ma, J.: Research on strategies to solve traffic congestion in smart cities under the background of big data. Comput. Knowl. Technol. 6(6), 4262–4264 (2018)

Discussion on the Construction of Wireless Campus Network Based on SDN Architecture Dongqing Hou(B) Information Department, West Yunnan University, Linxiang District, Lincang 677000, Yunnan, China [email protected]

Abstract. Starting from the wireless network architecture, this article expounds the concept and principle of VXLAN technology, and proposes a SDN wireless campus network construction scheme that uses distributed Vxlan gateway networking and a director controller. This solution realizes the decoupling of the control plane and the user plane. According to the user attributes, the label is automatically and uniformly issued and the strategy is issued. Users and terminals in the entire network can be connected to the wireless network at any time and at any location without any location restrictions. Network resources and network permissions are always consistent. Keywords: SDN · Wireless campus network · CAPWAP · VXLAN

1 Preface Information technology has changed the way people work and learn, and has given the education industry new connotations and requirements. In addition to the traditional teaching environment such as classrooms, laboratories and training rooms on campus, teaching activities of higher education also take place in cyberspace based on information technology. However, the traditional wired network can only provide fixed location services, and its application is subject to greater restrictions and constraints, making it difficult to meet the needs of multiple terminals, multiple scenarios, and multiple services [1]. In this context, the spring of the development of wireless campus networks in colleges and universities has ushered in the increasing application of mobile office, mobile teaching and mobile scientific research. With the popularity of intelligent mobile terminals, IoE (Internet of Everything) has brought an explosive growth in the number of terminals, the workload of network management and configuration has increased dramatically, and the security policies have become more complicated. The traditional wireless network architecture adopts a vertical layered model, coupling control plane and user plane data to network devices. Network devices must not only complete data forwarding [2], but also have control functions for generating forwarding and managing data forwarding rules [3]. The existing wireless network architecture is rigid and cumbersome under the new trend. In view of this, this article takes the

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 163–170, 2021. https://doi.org/10.1007/978-3-030-62746-1_24

164

D. Hou

West Yunnan Normal University of Science and Technology as an example, using the ADCampus technology proposed by H3C to build an intelligent SDN wireless campus network, providing network automation on-line, business end-to-end automated deployment, access user name and address binding, wired and wireless integration Management and other capabilities.

2 Overview of Key Technologies 2.1 CAPWAP CAPWAP (Control And Provisioning of Wireless Access Points) wireless access point control and configuration protocol [4], established by the CAPWAP working group established by the IETF, is used for wireless terminal access points (AP) and wireless network controllers (AC) Communication interaction between the AC and the AC to achieve centralized management and control of its associated AP. Therefore, CAPWAP can be said to be one of the most important technologies in the thin AP solution. CAPWAP is a UDP tunneling protocol that works at the application layer. UDP port 5246 is used to transmit control packets, and UDP port 5247 is used to transmit data packets. CAPWAP establishment needs to go through the following seven processes: AP discovers AC; AP obtains relevant information through DHCP; AP requests to join AC; AP automatically upgrades; AP configuration release; AP configuration confirmation; forwards data through CAPWAP tunnel [5].

Fig. 1. CAPWAP establishment process diagram

The establishment process of CAPWAP is shown in Fig. 1. After the AP is powered on, if there is a static AC IP list manually pre-configured by the administrator, the AP starts the pre-configured static discovery process to establish a connection with the specified AC; if the AC IP is not configured in advance List, start the AP dynamic discovery mechanism, obtain the IP address, DNS server, domain name and other information through DHCP, and broadcast the discovery request to contact the AC, the AC

Discussion on the Construction of Wireless Campus Network

165

that received the discovery request packet checks whether the AP has access authority, and if there is access The authority will reply to the confirmation message and establish a CAPWAP tunnel to forward user data. 2.2 VXLAN VXLAN (Virtual eXtensible Local Area Network) is one of the NVO3 (Network Virtualization over Layer 3) standard technologies defined by IETF and is essentially a tunneling technology [6]. NVO3 is a general term for the technology of building a virtual network based on a three-layer IP overlay network. VXLAN is just one of NVO3 technologies. The original data frame is encapsulated in a UDP packet by adding a VXLAN header, and the UDP packet is forwarded in the transmission mode of a traditional IP network. After the packet reaches the destination endpoint, the outer encapsulated part is removed, and the original data frame is delivered to the target terminal [7]. VXLAN is to build a virtual layer 2 network on a layer 3 network to achieve layer 2 communication between hosts. As shown in Fig. 2, the endpoints of the VXLAN tunnel are called VTEP (VXLAN Tunnel Endpoints) and are responsible for the encapsulation and decapsulation of VXLAN packets. A pair of VTEP corresponds to a VXLAN tunnel. The source VTEP encapsulates the packet and sends it to the destination VTEP through the tunnel. The destination VTEP decapsulates the received packet.

Fig. 2. VXLAN network model

Under the typical “Spine-Leaf” VXLAN networking structure, according to the deployment location of Layer 3 gateways, VXLAN Layer 3 gateways can be divided into centralized gateways and distributed gateways. A centralized gateway refers to the centralized deployment of a Layer 3 gateway on a Spine device, and all traffic across subnets is forwarded through the Layer 3 gateway to achieve centralized management of the traffic. A distributed gateway uses Leaf nodes as VXLAN tunnel endpoints VTEP. Each Leaf node can serve as a VXLAN Layer 3 gateway. Spine nodes are not aware of VXLAN tunnels and only serve as VXLAN packet forwarding nodes.

166

D. Hou

3 Architecture Analysis According to the actual situation of West Yunnan Normal University of Science and Technology, a distributed Vxlan gateway networking method is adopted. The network is composed of access, aggregation, and core three-layer equipment. The external is equipped with a director controller. The aggregation layer is VTEP and user gateway, AC, Director, and DHCP. The server is deployed centrally, and the architecture is shown in Fig. 3. The architecture of the solution has the following features: the access layer uses vlan for communication, the aggregation layer is isolated by Vxlan, the aggregation and core run Vxlan to build an overlay network, and a logical large layer 2 network, while using distributed gateways to effectively suppress broadcasts Storm; Adopt businessoriented grouping mode strategy, divide security groups according to business scope, and formulate access strategies based on security groups; 5W1H-based authentication mechanism develops multiple dimensions to cover access scenarios; supports user terminals throughout the life cycle of mac and IP Strong binding to meet the strong security needs of loose campus network users. With Director-guided configuration, administrators can complete the automatic generation of configuration files without entering any command line. After the device is powered on, it can automatically load configuration files of corresponding roles without manual intervention.

Fig. 3. Network architecture diagram

4 Implementation Process The Director uses the VLAN4094/VXLAN 4094 interface address as the management IP to manage Spine, Leaf, Access, and wireless AC equipment; the wireless AC equipment establishes a CAPWAP tunnel through VLAN4093/VXLAN 4093 to manage the AP. The port where the ACCESS switch connects to the AP enables PoE, and is configured as pvid 4093 and trunk vlan all.

Discussion on the Construction of Wireless Campus Network

167

The AC controller is hung on the spine, communicates with the AP through vlan4093/vxlan4093, communicates with the director through vlan4094 and is included in the management of the ADCampus platform, and communicates with the authentication server for authentication. The core device configuration is as follows: 4.1 Wireless Controller (1) Configure the Layer 3 interface VLAN4094 on the AC for the Director’s management AC; configure the Layer 3 interface VLAN4093 as the communication interface with the AP, and the AC establishes a CAPWAP tunnel with the AP through the interface address.

# interface Vlan-interface4094 ip address 10.200.4.4 255.255.252.0 interface Vlan-interface4093 ip address 10.201.255.253 255.255.240.0 # (2) Configure a local user, and the Director uses this user to connect and manage the AP.

(3) To use AP local forwarding mode, a configuration file needs to be generated locally and downloaded to the wireless AC. It is used to automatically configure all VLANs of the uplink trunk after the AP goes online, and the authorization acl required for MAC portal authentication.

168

D. Hou

(4) Use map-configuration to specify the AP configuration file in the default ap group. When the AP goes online, the configuration file is automatically downloaded and effective.

4.2 Sping Equipment Configure the interface connected to the wireless controller as a trunk port and allow all VLANs to pass. And configure a server instance on the interface, bind vlan4094 and vsi4094 to the instance, which is used to realize the connection between the management channel and the control channel.

Discussion on the Construction of Wireless Campus Network

169

4.3 Director Configuration The core of the SDN network architecture is the Director controller, which is responsible for the generation and distribution of all network device configuration policies and effective management of Internet users. Deploy multiple servers in a cluster to install the Director controller platform and DHCP server, and connect the cluster server directly to the Spine core switch. After completing the above deployment, you can directly log in to the Director platform through HTTP protocol to complete the automatic launch of the device, management and policy settings. (1) Campus planning The “Campus Planning” module on the Director controller can plan the network management address segment, realize automatic deployment, and configure automatic deployment parameters and related strategies. According to the previous plan, divide the network into three layers: Spine, leaf, and Access. Set the deployment strategy template for the three-layer equipment and configure the network management address segment to 10.200.4.0/22. When the device goes online automatically, it can automatically obtain the management address and issue the policy template of the corresponding device, so that the device can go online automatically. (2) Wireless management network configuration Create a Layer 2 network domain and security group for wireless management through the “business” module on the Director controller. The configuration is as follows: the IP address segment is set to 10.201.240.0/22; vlan/vxlan are both configured to 4093; turn on arp proxy; configuration AC IP is the IP address of the wireless AC; add the corresponding security group, select the dhcp option to create an address pool on the DHCP server. After the Director wireless network core function configuration is completed, the system will automatically send and receive vxlan and vsi interface configuration on Access, leaf, and spine to complete the device automatic online. Drictor can monitor the

170

D. Hou

running status of events, fault information, health status and performance data of on-line equipment and related subsystems, and provide northbound API interface, with strong programmability to meet the integration requirements of automation platforms or cloud computing platforms [8].

5 Conclusion The wireless campus network solution based on the SDN architecture proposed in this paper is based on VXLAN technology and uses Director as the core controller to provide network automation on-line, business end-to-end automated deployment, access user name and address binding, wired and wireless integrated management, etc. ability. Realize the decoupling of the control plane and the user plane, according to the user attributes, automatically and uniformly mark and issue the strategy, users and terminals in the entire network can be free of location restrictions, access to the wireless network at any time, any location, and obtain network resources Consistent with the network authority, to achieve the effect of the network with people [9, 10]. However, this solution is still not a complete SDN architecture, and not all equipment and functions can provide software definitions according to actual needs. Acknowledgements. This work was supported by Scientific research fund project of Yunnan Education Department 2017. Project Name: Research On Campus Network Transformation Scheme Based On IPv6 In Frontier Universities, No.: 2017ZZX113.

References 1. Lv, S., Zhang, W.: Present situation and optimization strategy of campus wireless network construction in colleges and universities. Electron. World 9(5), 13–14 (2020). (in Chinese) 2. Kim, H., Framster, N.: Improving network management with software defined networking. IEEE Commun. Mag. 51(2), 114–119 (2013) 3. Hong, B., Wei, D.: SDN-based distributed wireless network architecture and controller configuration strategy. Firepower Command Control 44(12), 158–162 (2019). (in Chinese) 4. Wang, Q.: Application of wireless controller AC and thin AP in campus network across multiple router environments. New Course 2, 173 (2015). (in Chinese) 5. Yue, C.: Research on networking technology based on thin AP+AC mode. Sci. Technol. Innov. 20, 69–71 (2018). (in Chinese) 6. Zhang, Z., Cui, Y., et al.: Research progress of software-defined networking (SDN). Journal of Software 26(1), 63–80 (2015). (in Chinese) 7. Lin, W.: Research on the flat architecture design of campus network based on SDN and VXLAN. Comput. Knowl. Technol. 15(26), 53–54 (2019). (in Chinese) 8. Zhang, C., Yang, F.: Research on the planning, construction and deployment of SDN wireless campus network. Electron. World 24, 102–103 (2019). (in Chinese) 9. Bertaux, L., Medjiah, S., Berthou, P., et al.: Software de-fined networking and virtualization for broadband satellite networks. IEEE Commun. Mag. 53(3), 54–60 (2015) 10. Erran, L., Morley, M.Z., Rexford, J.: Toward software-defined cellular networks. In: 2012 European Workshop on Software Defined Networking, vol. 5, pp. 7–12 (2012). (in Chinese)

Applicational Status Analysis of Artificial Intelligence Technology in Middle School Education and Teaching Zhi Cheng(B) Hainan Tropical Ocean University, Sanya 572022, Hainan, China [email protected]

Abstract. With the development of the times, the progress of society, the continuous improvement of human science and technology and cultural level, the traditional middle school education and teaching has been unable to meet the learning needs of middle school students in the new era. In order to better make secondary education and teaching conform to the current trend of development, this paper puts forward the application of artificial intelligence technology in middle school education and teaching, in order to improve the teaching level of middle school education. Intelligent teaching in the field of artificial intelligence technology is a new product under the development of the current era, and has a high status in middle school education and teaching. Therefore, this paper analyzes the necessity of carrying out intelligent teaching in the field of artificial intelligence technology in middle school education and teaching, and systematically expounds the shortcomings in current middle school education and teaching, and makes a deep analysis on the reform needed in the future middle school education and teaching. Through the research and analysis, it is found that the artificial intelligence technology proposed in this paper has a great effect on the innovation and reform of middle school education and teaching. Keywords: Science and technology culture · Middle school education · Artificial intelligence · Innovation and reform

1 Introduction Artificial intelligence (AI) is an important branch of modern computer science [1, 2]. At present, in the field of base education in China, the research and implementation of artificial intelligence include two main aspects: one is to set up the course of artificial intelligence information technology. The main content includes the knowledge of artificial intelligence in the compulsory course of information technology in middle school education and the optional course of artificial intelligence information technology in primary school. On the other hand, the application of artificial intelligence in subject teaching, namely artificial intelligence [3–5], provides rich educational resources and scientific education evaluation methods for school education and teaching. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 171–178, 2021. https://doi.org/10.1007/978-3-030-62746-1_25

172

Z. Cheng

From the current situation, the importance of carrying out intelligent education in secondary schools [6–8] is reflected in the following aspects: one feature is that intelligent education meets the application and development requirements of artificial intelligence. In recent years, with the development of Internet and artificial intelligence, artificial intelligence technology has gradually developed and penetrated into all fields of modern people’s work and daily life. A new form of education and application of artificial intelligence has been formed. At present, artificial intelligence education is in the stage of rapid development. If the artificial intelligence education in a middle school is not fully applied and developed, then the ability of intelligent education learning activities and the efficiency and level of intelligent education learning of this middle school student may also be different and different with other artificial intelligence schools which can fully apply and develop artificial intelligence education. Second, give full play to the supporting role and value of middle school students. In addition to school education, high-tech education with artificial intelligence as the core is also one of the focuses of education. Middle school students are the pillar of the future development of artificial intelligence. The quality of intelligent education determines the role of middle school students in the field of artificial intelligence. The above situation puts forward higher requirements for the development of wisdom education [9, 10] in primary and secondary schools. This paper mainly studies the innovation and reform of middle school education and teaching in the new era. In order to make contemporary middle school students better conform to the development trend of the times, keep pace with the development of the times and enrich their learning methods and learning contents, this paper puts forward the method of applying artificial intelligence technology to the innovation and reform of middle school education and teaching, and systematically expounds the current situation This paper analyzes the shortcomings in the teaching of learning education, and makes a deep analysis of the reform needed in the future middle school education and teaching. Through the research and analysis, it is found that the artificial intelligence technology proposed in this paper has a great effect on the innovation and reform of middle school education and teaching.

2 Application of Artificial Intelligence Technology in Middle School Education and Teaching 2.1 Artificial Intelligence Technology Artificial intelligence is a science that studies how to use computers to simulate human intelligence. With the development of modern computer technology and the rapid development of social informatization, people pay more and more attention to the practical application of artificial intelligence and how to use artificial intelligence to change the production and life style of society. Education is the cornerstone of social progress, and the application of artificial intelligence is reasonable. First of all, it should be extended to the field of secondary education and teaching. Second, language is the most proud wisdom of mankind. Whether it is Turing test, natural language processing, machine translation, speech recognition technology, the application of artificial intelligence technology in language learning is natural.

Applicational Status Analysis of Artificial Intelligence Technology

173

2.2 Innovation and Development of Middle School Education and Teaching In order to better develop middle school education and teaching, we can combine the characteristics of middle school intelligent education, select the appropriate classic artificial intelligence technology as auxiliary tools, and jointly improve the quality of intelligent education. For example, VR technology, as a classic artificial intelligence technology, has obvious advantages in the creation of scenarios and the construction of interactive environment. In the process of carrying out the reform of middle school intelligent education, the technology can be combined with intelligent education to create a virtual learning space for middle school students. Galileo ideal experiment in middle school physics as an example, in the teaching process, virtual reality technology can be used to create a smooth track and small ball composition to meet the needs of students to observe the trajectory and speed characteristics of the ball smooth track.

3 Experimental Correlation Analysis 3.1 Experimental Background This paper investigates and studies the research and application of artificial intelligence information technology in the practice of artificial intelligence teaching in secondary vocational education in China, and makes a quantitative and qualitative analysis on the research of journals and literatures related to artificial intelligence information technology. Firstly, according to the statistical data of artificial intelligence published in journals, the mathematical intelligence analysis model is established, and the artificial intelligence index of the research object is analyzed and calculated by using the relevant mathematical intelligence model. Then, according to the numerical indicators of each object in the literature, combined with the actual situation of the first-line classroom and the latest development in the field of artificial intelligence, the nature, characteristics, development and change law of the object are judged and analyzed. 3.2 Experimental Design From the number of journals published, artificial intelligence has become an important research field and development direction in the field of educational technology. The application of artificial intelligence in middle school education and teaching has also been widely concerned by experts and scholars. The following table shows the statistical results of artificial intelligence related literatures in recent five years. There are 79 literatures related to middle school education and teaching, accounting for 39.3% of the total length. The details are shown in Table 1:

174

Z. Cheng Table 1. Statistics of the number of journal publications

Title

The number of articles directly related to middle school

Total number of articles

E-education research

15

50

China educational technology

23

66

Modern educational technology

41

82

Medical education technology in China

0

3

79

201

Total

4 Discussion 4.1 Analysis of the Current Situation of Middle School Education and Teaching Based on Artificial Intelligence Under the background of the popularization of artificial intelligence in middle schools, basic intelligence education has been carried out. However, from the actual situation of wisdom education in middle schools, the wisdom teaching mode in different schools is generally lack of unity and standardization. The main reasons for the above situation are: the development time of artificial intelligence in China is relatively short, the experience of carrying out intelligent education is insufficient, and the related intelligent education system is not perfect, which eventually leads to the differences of intelligent teaching mode in this respect. Based on this, in order to better carry out the innovation reform 35 30

number

25 20 15 10 5 0 2008

2010

2012

2014

2016

2018

year

Fig. 1. Time series chart of the number of published articles

2020

Applicational Status Analysis of Artificial Intelligence Technology

175

method of secondary education based on artificial intelligence, this paper investigates and analyzes the publication time series of artificial intelligence literature in China. As shown in Fig. 1, according to the publication time series of journal literature, the number of literature presents a “convex” distribution. When artificial intelligence became the first simulated examination in the field of education, people were curious and expected that this new technology could imitate the human brain. Academic attention to this issue is increasing year by year. However, due to the complex discipline background of brain neuroscience, computer science, pedagogy, psychology and other complex disciplines, many experts and scholars have gradually weakened the research on artificial intelligence, so its development speed is slow, and the attention has been declining after 2016. According to the development trend of research literature, this paper divides the research content into five categories. According to the research category, the research literature was statistically analyzed. The results are shown in Fig. 2. Among them, I refer to the research on the theory of artificial intelligence, II refers to the application research of artificial intelligence in education, III represents the research and development of artificial intelligence system, IV represents the teaching research of artificial intelligence, and V refers to others. 35 30

number

25 20 15 10 5 0 I

II

III

IV

V

Research category

Fig. 2. Statistics of journal literature research categories

As can be seen from Fig. 2, the research contents are mainly focused on the theoretical research and system development of artificial intelligence, the application of artificial intelligence in education and the research in course teaching, and the distribution is relatively uniform. In the in-depth study, it is found that “robot teaching” is the main content in the teaching research of artificial intelligence course. The application of artificial intelligence education is mainly concentrated in Colleges and universities, and the application in middle school is relatively simple, such as the application of Z+Z intelligent education software in mathematics teaching.

176

Z. Cheng

4.2 Suggestions on the Development of Middle School Education and Teaching Based on Artificial Intelligence With the development of artificial intelligence technology, intelligent education has gradually become one of the focuses of middle school education system. As there are still many deficiencies in the current middle school wisdom education, the role of wisdom education has not been fully played. How to improve the quality of wisdom education has become the main problem of wisdom education in middle schools. As the core of intelligent education, it is necessary to analyze the application of artificial intelligence in middle school. In China, as a leading information technology, artificial intelligence is becoming more and more active in theoretical research and teaching practice in the field of education, which has laid a rich theoretical and practical foundation for digital education and educational management informatization in China. In particular, scholars in the field of educational technology in China are very keen on the application of artificial intelligence in the field of education, and gradually shift the focus of research from theoretical research to technological development research. Therefore, the research results in recent years are very significant, and the representative achievements are: the “intelligent teaching system” teaching system developed by Zhang Jingzhong, academician of Chinese Academy of Sciences, which is mainly aimed at the auxiliary teaching of mathematics. Its goal is to use the related technology of artificial intelligence to solve problems intelligently, automatically infer, draw dynamic diagram, and even interact with students. Through the use of various information technology and tools, the geometric thinking and spatial sense of teachers and students are fully cultivated, so as to effectively improve the teaching effect of mathematics. However, compared with the current foreign mathematics related research, it is relatively late in our country to expand the application of advanced artificial intelligence technology to the field of education and teaching research, and there is a certain gap with the research level of foreign countries. The scope of mathematics research in China is not wide enough and the degree is not deep enough. Artificial intelligence technology, as a cutting-edge discipline that has crossed many disciplines, is changing the way of expression of modern people’s daily thinking and people’s traditional concepts, and improving the comprehensive application level of scientific knowledge and the theoretical and practical level of modern people’s higher education. In the history of the development of higher education in China, the technology of bringing forth the new from the old often provides a strong support and impetus for the reform and innovation of modern education, which makes the development of teaching and scientific research more convenient and efficient, and makes education more and more fair, universal and popular. The intelligent education software can realize the vision, hearing, speaking and even understanding and feedback of the user’s emotion or emotion, so that the user can communicate with various computer electronic devices naturally and fluently through language, text, gesture, expression and other ways, so as to realize the human-computer interaction. In a word, the reform brought about by the development of technology is to deepen the application of modern education and teaching. As the scientific and technological achievements of the three 20th century and new technologies such as space technology, atomic energy technology, artificial intelligence, etc., will be

Applicational Status Analysis of Artificial Intelligence Technology

177

widely used in the field of modern education, and will have a profound impact on the concept of modern education, teaching process and teaching management in the future. Science and technology management is undoubtedly one of the important components of the middle school education system. By analyzing the current situation of science and technology management in middle schools, the main obstacles and problems of science and technology management include: the management of scientific research fund is complex, the approval process is complex, time-consuming, and the evaluation of scientific research workers is very difficult. The integrated technology management and intelligent education, independent scientific research management functions can directly open the intelligent education platform, and the traditional artificial management mode can replace the scientific research management function and big data technology based on artificial intelligence technology in science and technology management. For example, in the aspect of scientific research fund management, instead of the traditional manual approval mode, researchers can directly log in their own accounts in the intelligent education platform of the scientific research management subsystem, enter the scientific research management background, account information of the association, and quickly input the relevant information platform of new scientific research projects. It can meet the funding needs of scientific research workers and provide certain funds for scientific research workers efficiently and conveniently.

5 Conclusions In order to make contemporary middle school students keep up with the pace of the development of the times and enrich their knowledge and cultural life in the present era, this paper puts forward the method of applying artificial intelligence in middle school education and teaching to carry out innovation reform in middle school education and teaching Education and teaching in the situation, the development is not very full, there are many problems need to be taken seriously. Therefore, this paper systematically expounds the shortcomings of current middle school education and teaching, and makes an in-depth analysis of the reform needed in the future middle school education and teaching. Through the research and analysis, it is found that the artificial intelligence technology proposed in this paper has a great effect on the innovation and reform of middle school education and teaching. Acknowledgements. Fundation: Educational Informatization Promote the Research of Educational Precise Poverty Alleviation in Hainan Minority Region (Serial number: RHDXB201703).

References 1. Roach, S., Sahami, M.: CS2013: computer science curricula 2013. Computer 48(3), 114–116 (2015) 2. Al-Fedaghi, S.: Int. J. Adv. Comput. Sci. Appl. 7(11), 1–6 (2016) 3. Jeavons, A.: What is artificial intelligence? Res. World 2017(65), 75 (2017) 4. Lu, H., Li, Y., Chen, M., et al.: Brain intelligence: go beyond artificial intelligence. Mob. Netw. Appl. 23(2), 368–375 (2017)

178

Z. Cheng

5. Crawford, E.D., Batuello, J.T., Snow, P., et al.: The use of artificial intelligence technology to predict lymph node spread in men with clinically localized prostate carcinoma. Cancer 88(9), 2105–2109 (2015) 6. Ladd, H.F., Sorensen, L.C.: Returns to teacher experience: student achievement and motivation in middle school. Educ. Finance Policy 12(2), 1–70 (2017) 7. Forgan, J.W., Vaughn, S.: Adolescents with and without LD make the transition to middle school. J. Learn. Disabil. 33(1), 33–43 (2016) 8. Corey, C.G., Ambrose, B.K., Apelberg, B.J., et al.: Flavored tobacco product use among middle and high school students - United States, 2014. MMWR Morb. Mortal. Wkly. Rep. 64(38), 1066–1070 (2015) 9. Martinez, M.: The pursuit of wisdom and happiness in education. Retour Au Numéro 39(10), 745–774 (2015) 10. Hidayati, N.A., Waluyo, H.J., Winarni, R., et al.: Exploring the implementation of local wisdom-based character education among indonesian higher education students. Int. J. Instr. 13(2), 179–198 (2020)

Virtual Enterprise Partner Selection by Improved Analytic Hierarchy Process with Entropy Weight and Range Method Junfeng Zhao1(B) and Xinyi Huang2 1 School of Mechanical and Electrical Engineering, Guangdong Polytechnic

of Industry and Commerce, 510510 Guangdong, China [email protected] 2 School of Mathematics, South China University of Technology, 510640 Guangdong, China

Abstract. Virtual enterprise is a new enterprise model born at the end of the 20th century, and it is a hot topic how to deal with virtual enterprises. Firstly, basic steps of traditional analytic hierarchy process (AHP) are introduced, on the basis of which, the range matrix and the entropy weight are applied to improve the judgment matrix between indicators. Secondly, entropy weight is presented to calculate the judgment matrix between the enterprise and the index. The weight of the matrix is recorded as objective weight. Then the two weights are coupled by the optimal weighting method. Furthermore, the coupling optimization weight is calculated by Lagrange multiplier method instead of the weight in the original analytic hierarchy process. Finally, compared with the standard AHP, the simulation results of the example by improved AHP are more reliable. Keywords: Partner selection · Analytic hierarchy process (AHP) · Entropy method · Range method · Lagrange multiplier method

1 Introduction As the further development of economy and society, the virtual enterprise has become an important part of the decision, especially when enterprise making decision to choose partner. In order to survive in the fierce market competition, the decision made by the enterprise of choosing partner must be effectively and time-saving. While in the analytic hierarchy process method to solve the partner selection, it has the biggest problem that the human factors of data have a great influence so that it can’t give a correct advice to the enterprise manager. Gui et al. [1] did some work about on in virtual enterprises partner selection base on the NSGA-II. Li [2] et al. introduced the multi-objective decision making in partner selection of virtual enterprises. The interval neutrosophic preference relations were presented by Meng and Wang [3]. Risk assessment approach for a virtual enterprise was given by Mahmood et al. [4] Liao et al. [5] committed to the benefit analysis of enterprise server virtualization and cloud computing. Huang et al. [6] coped with the multi-criterion © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 179–186, 2021. https://doi.org/10.1007/978-3-030-62746-1_26

180

J. Zhao and X. Huang

partner selection problem. Form another perspective, Son et al. [7] addressed on the optimization research of partner selection and collaborative transportation scheduling in virtual enterprises by using GA. Shahrzad et al. [8] dealt with the design of a customer type for partner selection problem in practical life. Kohnke [9] dis some work about the risk and rewards of enterprise use of reality. The problem about partner selection under uncertain information about candidates was solved by Huang and Gao [10].

2 Establishment of Virtual Enterprise From the perspective of information network, it refers to the enterprise organization without formal organizational structure connected by information network. The establishment of virtual enterprise is divided into four stages: Step 1: Determine the objectives and goals to be achieved according to the market opportunities and their own resources. Step 2: Evaluate the existing resources among enterprises, establish Virtual Enterprise model and select the compatible partners. Step 3: Through the evaluation of enterprises, the organizational form is designed to distribute the benefits and risks of each enterprise at the same time. Step 4: Integrate the resource implementation plan of the enterprise organization.

3 Standard Analytic Hierarchy Process (SAHP) AHP is a decision-making method presented by Saaty of the United States in the 1970s, the concrete steps: Step 1: Construct hierarchical structure model. Step 2: Construct judgment matrix. Step 3: Calculate weight vector by square root method (geometric average method). Step 4: Consistency test. We introduce a consistency indicator CI . The smaller indicator CI , the greater consistency. When n is large, the average random consistency index RI is introduced to measure CI . CI =

CI1 + CI2 + · · · + CIn λ−n , RI = . n−1 n

(1)

Compare CI with RI to get the test coefficient CR, CR = CI /RI . Step 5: Hierarchical total sequencing and consistency test.

4 Improved Analytic Hierarchy Process (IAHP) One of the disadvantages of the standard analytic hierarchy process is that there are more qualitative data, which leads to a greater impact of subjective factors. Therefore, one of the ways to improve the method is to reduce the subjective factors and increase the credibility of the results, which is convincing. In reference [10], range method and entropy weight method are used to improve the standard analytic hierarchy process.

Virtual Enterprise Partner Selection by IAHP

181

4.1 New Judgment Matrix Construction by Range Method For judgment matrix A = (aij )m×n , the ranking index is calculated: ri =

n 

aij . Then a

j=1

new judgment matrix C is constructed by range method:  ri −rj R

Cij = Cb

, R = rmax − rmin , i = 1, 2, . . . , m.

(2)

In the above formula, Cb is generally taken as 9, and R is the range. 4.2 Weight Calculation Steps by Entropy Weight Method Step 1: Constructing m samples and n indexes judgment matrix R = (rij )m×n ; Step 2: Normalize judgment matrix to get the normalized judgment matrix P = the m  rij ; (pij )m×n , pij = rij i=1

m  pij ln pij , j = 1, 2, . . . , n; Step 3: Obtain the entropy value of the index ej = − i=1  n      Step 4: Calculate the indicator weight wj = 1 − ej 1 − ej . j=1

4.3 Weight Optimization by Lagrange Multiplier Method (LMM) In reference [10], the subjective and objective weights (w1 and w2 ) are coupled to get the optimized weight, and the optimal weight is used for coupling optimization:



⎧ n n   wj wj ⎪ ⎪ min D = ln ln w + w   j j ⎨ wj wj j=1 j=1 (3) n  ⎪ ⎪ wj = 1, wj > 0. ⎩ s.t. j=1

The LMM is used to solve the problem. The steps are: Step 1: Introducing functions: L(w1 , w2 , . . . , wn , λ), we can obtain L(w1 , w2 , . . . , wn , λ) = f (w1 , w2 , . . . , wn ) − λg(w1 , w2 , . . . , wn ),

f (w1 , w2 , . . . , wn ) =

n  j=1



wj wj ln w1j

g(w1 , w2 , . . . , wn ) =



n 

+

n 



j=1

 wj wj ln , w2j

(4)

wj − 1.

j=1

Step 2: Let the partial differential be zero, so that we can obtain solutions. Note that w = (w1 , w2 , . . . , wn )T is the coupling optimization weight.

(5)

(6)

182

J. Zhao and X. Huang

5 Numerical Examples of Virtual Enterprise Partner Selection Now an example is verified the effectiveness of IAHP. The data comes from reference [2]. An enterprise wants to establish a virtual enterprise, and the target criteria given are: quality a1 , reputation a2 , technical personnel content a3 , production capacity a4 , punishment a5 , price a6 and completion time a7 . The first five are gain criteria and the last two are profit and loss criteria. The judgment matrix is as follows: Table 1. Judgment matrix between objective criteria Index a1

a2

a3

a4 a5

a6

a7

a1

1

5

5

9

3

3

2

a2

1/5 1

1/2 3

1

1/3 1/4

a3

1/5 2

1

3

1/2 1/3 1/4

a4

1/9 1/3 1/3 1

1/5 1/7 1/8

a5

1/3 1

2

5

1

2

2

a6

1/3 3

3

7

1/2 1

2

a7

1/2 4

4

8

1/2 1/2 1

First, changing the judgment matrix of Table 1 to five scales, obtain ⎧   ⎪ 1, 1, 1 9 ≤ aij ≤ 1 7, ⎪ ⎪ ⎪ ⎪ ⎨ 2, 1 5 ≤ aij ≤ 1 3, aij = 3, 1 3 ≤ aij ≤ 3, ⎪ ⎪ ⎪ 4, 3 ≤ aij ≤ 5, ⎪ ⎪ ⎩ 5, 7 ≤ a ≤ 9. ij After the change, there is a five-scale judgment matrix, as shown in Table 2: Table 2. Judgment matrix in five scales Index a1 a2 a3 a4 a5 a6 a7 a1

3

4

4

5

4

4

3

a2

2

3

3

4

3

2

2

a3

2

3

3

4

3

2

2

a4

1

2

2

3

2

1

1

a5

2

3

3

4

3

3

3

a6

2

4

4

5

3

3

3

a7

3

4

4

5

3

3

3

(7)

Virtual Enterprise Partner Selection by IAHP

183

Then modify the data in Table 2 with the formula (2) in the range method, and the result is as shown in the table below: Table 3. The modified judgment matrix by range method Index a1

a2

a3

a4

a5

a6

a7

a1

1.0000 3.2280 3.2280 9.0000 2.4082 1.5518 1.3404

a2

0.3098 1.0000 1.0000 2.7781 0.7460 0.4087 0.4152

a3

0.3098 1.0000 1.0000 2.7781 0.7460 0.4087 0.4152

a4

0.1111 0.3587 0.3587 1.0000 0.2676 0.1724 0.1489

a5

0.4152 1.3404 1.3404 3.7372 1.0000 0.6444 0.5566

a6

0.6444 2.0801 2.0801 5.7995 1.5518 1.0000 0.8637

a7

0.7460 2.4082 2.4082 6.7144 1.7967 1.1578 1.0000

Then use the square root method (geometric average method) to calculate the weight of the judgment matrix, which is the subjective weight, and the result is as follow: w1 = (0.2828, 0.0876, 0.0876, 0.0314, 0.1174, 0.1822, 0.2110)T .

(8)

The consistency test is carried out for the subjective weight w1 . Because n = 7, so RI = 1.36, test coefficient CR = 0 < 0.10, we can accept the result. From the results, the order of importance of the seven indicators is: quality, completion time, price, punishment, reputation and technical personnel content, production capacity. This correspond to the reality. Next, the objective weight is calculated, and the required data is shown in the table below: Table 4. Value of candidate enterprises about each target criterion Candidate enterprises a1 a2 a3 a4 a5

a6

a7

E1

5

9

30 9

0.86 2.87 150

E2

6

7

25 7

0.90 3.00 120

E3

7

8

50 6

0.89 2.96 135

E4

4

5

30 5

0.84 2.79 180

E5

8

6

28 8

0.91 3.02 115

E6

7

7

40 9

0.84 2.78 140

E7

5

8

35 4

0.96 3.21 125

E8

6

9

29 6

0.91 3.05 130

184

J. Zhao and X. Huang Table 5. Normalization rules for the data of Table 4

Index 1

2

3

4

5

a1

4

5

6

7

8

a2

5

6

7

8

9

a3

< 30

30 ≤ aij < 35

35 ≤ aij < 40

40 ≤ aij < 45

45 ≤ aij ≤ 50

a4

≤5

6

7

8

9

a5

≤ 0.86 0.86 < aij ≤ 0.88 0.88 < aij ≤ 0.90 0.90 < aij ≤ 0.92 > 0.92

a6

≤ 2.86 2.86 < aij ≤ 2.95 2.95 < aij ≤ 3.04 3.04 < aij ≤ 3.13 > 3.13

a7

≤ 128

128 < aij ≤ 141

141 < aij ≤ 154

154 < aij ≤ 167

167 < aij ≤ 180

The data in Table 4 after the specification becomes as follows: Table 6. The enterprise value about target criterion after standardization Candidate enterprises a1 a2 a3 a4 a5 a6 a7 E1

2

5

2

5

1

2

3

E2

3

3

1

3

3

3

1

E3

4

4

5

2

2

3

2

E4

1

1

2

1

1

1

5

E5

5

2

1

4

3

3

1

E6

4

3

4

5

1

1

2

E7

2

4

3

1

5

5

1

E8

3

5

1

2

3

4

2

The data in Table 6 is regarded as a judgment matrix of samples and indicators, and the objective weight w2 is calculated by entropy weight method: w2 = (0.1493, 0.1498, 0.1371, 0.1403, 0.1398, 0.14480.1389)T .

(9)

The subjective weight w1 is coupled with the objective weight w2 , and then the LMM is used to calculate the coupling optimization weight. w = (0.2145, 0.1196, 0.1144, 0.0693, 0.1388, 0.1696, 0.1788)T .

(10)

The weight of seven objective criteria calculated by three methods is shown: The weight w of coupling optimization is used to replace the weight of judgment matrix in reference [1]. The calculation formula is as follows: smk =

vkm − min (vkm ) 1≤m≤M

max (vkm ) − min (vkm )

1≤m≤M

1≤m≤M

, smh =

max (vhm ) − vhm

1≤m≤M

max (vhm ) − min (vhm )

1≤m≤M

1≤m≤M

.

(11)

Virtual Enterprise Partner Selection by IAHP

185

In the above formula, v represents the value of the enterprise on the target criterion, smk is the priority score under the gain criterion, and smh is the priority score under the profit and loss criterion. The total priority score Sm is calculated: Km =

K 

wk smk , Kh =

k=1

K 

wk smh , Sm = Km + Hm .

(12)

k=1

The judgment matrix in Table 1 is calculated by the standard analytic hierarchy process, and the weight w3 obtained by the square root method is as follows: w3 = (0.3547, 0.0639, 0.0706, 0.0258, 0.1568, 0.1673, 0.1609)T .

(13)

Fig. 1. Calculate weights by subjective, objective and couple optimization

According to formulas (11–12), calculate the total priority score of the enterprise:

Total priority score

0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0

Standard AHP Improved AHP

E1

E2

E3

E4

E5

E6

E7

E8

Candidate

Fig. 2. Comparison of total priority scores between SAHP and IAHP

It can be seen from Table 6 and Fig. 2 that the priority of candidate enterprise selection obtained by the improved AHP is E3, E5, E6, E8, E2, E1, E7 and E4, and the priority of

186

J. Zhao and X. Huang

candidate enterprise selection obtained by the standard AHP is E5, E3, E6, E8, E2, E7, E1 and E4. There is no significant difference between the two, but the improved AHP reduces too many subjective factors, so it is more reliable.

6 Conclusion The standard analytic hierarchy process and virtual enterprises are introduced. Then the standard AHP is modified by changing the judgment matrix. We apply the range method to modify the judgment matrix. The corresponding weight of the matrix is subjective weight. Then, the entropy method is adopted to calculate the judgment matrix between enterprises and indicators. Lastly, we apply Lagrange multiplier method to calculate the coupling optimization weight instead of the weight in the standard AHP. Furthermore, the modified AHP is applied to simulate the decision-making problem. The computation results show that our improved AHP is more effective than standard AHP. Acknowledgements. This research was supported by the “Natural Science Foundation of Guangdong Province, No. 2019A1515011038”, “Soft Science of Guangdong Province, and No. 2018A070712002, 2019A101002118”, “Guangdong Province Characteristic Innovation Project of Colleges and Universities, No. 2019GKTSCX023”. The authors are highly grateful to the referees and editor in-chief for their very helpful comments.

References 1. Gui, H.X., Zhao, B.L., Wang, X.Q, Li, H.Z.: Research on partner selection in virtual enterprises based on NSGA-II. In: ISICA2019, vol. 1205, pp. 307–319 (2020) 2. Li, L., Que, J.S., Zhu, Y.L.: Multi-objective decision making in partner selection of virtual enterprises. Comput. Integr. Manuf. Syst. CIMS 8(2), 91–94 (2002). (In Chinese) 3. Meng, F.Y., Wang, N., Xu, Y.W.: Interval neutrosophic preference relations and their application in virtual enterprise partner selection. J. Ambient Intell. Humanized Comput. 10(12), 5007–5036 (2019) 4. Mahmood, K., Shevtshenko, E., Karaulova, T., Otto, J.: Risk assessment approach for a virtual enterprise of small and medium-sized enterprises. Proc. Estonian Acad. Sci. 67(1), 17–27 (2018) 5. Liao, H., Liu, S., Chiou, J.: Benefit analysis of enterprise server virtualization and cloud computing. Paper Aisa, v COMPENDIUM 1(7), 35–41 (2018) 6. Huang, B., Bai, L., Roy, A., Ma, N.: A multi-criterion partner selection problem for virtual manufacturing enterprises under uncertainty. Int. J. Prod. Econ. 196, 68–81 (2018) 7. Son, D.D., Kazem, A., Romeo, M.: Optimisation of partner selection and collaborative transportation scheduling in virtual enterprises using GA. Expert Syst. Appl. 41(15), 6701–6717 (2014) 8. Shahrzad, N., Ahmet, M.O., Hakki, O.U., Sadik, E.K.: Design of a customer’s type based algorithm for partner selection problem of virtual enterprise. Procedia Comput. Sci. 95, 467– 474 (2016) 9. Kohnke, A.: The risk and rewards of enterprise use of augmented reality and virtual reality. ISACA J. 1, 16–23 (2020) 10. Huang, B., Gao, C.H.: Partner selection in a virtual enterprise under uncertain information about candidates. Expert Syst. Appl. 38(9), 11305–11310 (2011)

Research and Implementation of Intelligent Tourism Guide System Based on Cloud Computing Platform Xu Yan and Zhao Juan(B) Shandong Institute of Commerce and Technology, Jinan 250103, China [email protected], [email protected]

Abstract. The rapid development of tourism industry will be accompanied by a large number of tourism data and information, and the development of tourism information system in different regions is unbalanced, and tourism information is basically not shared, so it is inevitable to adopt cloud computing technology to support the tourism system. This paper collects and analyzes the cases of cloud computing technology used in tourism industry at home and abroad, combined with its advantages and disadvantages, uses the idea of SOA to model services and data, and then puts forward the architecture of tourism cloud services. According to the characteristics of tourism business, the system construction of tourism cloud platform is divided into three parts: Tourism private cloud, tourism exclusive cloud and tourism public cloud. And the tourism private cloud platform for specific planning and design. In view of the rapid growth of tourism data, this paper also proposes a recommendation algorithm based on the information of tourists and scenic spots, which combines the collaborative filtering algorithm based on users and the information recommendation algorithm based on geographical location, so as to push more accurate information to tourists. Finally, due to the increasing number of free travelers, this paper develops an intelligent navigation system based on Android Application on the basis of cloud platform. The system mainly includes three service modules: scenic spot information service, tourists can query the basic information of scenic spots, tour group information, etc.; tour guide service, tourists can query the route, GPS Location, nearby search, weather forecast, etc.; tour strategy service, tourists can query the strategy of scenic spots, upload and release the strategy, and view and download offline maps. Through demand analysis and design, the Intelligent Tourism guidance system based on cloud computing platform is realized, which not only reduces the pressure of processing a large number of data and the state of insufficient information sharing, but also meets the needs of free travelers. Keywords: Tourism cloud · Mobile navigation · GPS positioning

1 Introduction With the progress of social economy and the rapid development of information technology, the profits of China’s tourism industry have been growing by leaps and bounds. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 187–192, 2021. https://doi.org/10.1007/978-3-030-62746-1_27

188

X. Yan and Z. Juan

According to the calculation, in 2014, the tourism income of the mainland, Hong Kong, Macao and Taiwan can reach 2.9 trillion yuan, the number of tourists in the country has exceeded 3.25 billion people, the number of outbound tourists has also increased day by day, breaking through 97300000 person times, and the foreign exchange income of inbound tourism has broken through With us $47.8 billion, the number of new direct tourism employment has reached more than 500000 [1]. While promoting the development of tourism in the world, the focus of global tourism also flows to Asia, especially China. According to World Tourism According to the tourism outlook information released by the organization, by 2020, Europe will provide more than 700 million outbound tourists, which is still the region with the largest number of outbound tourists in the world. About 6% of the tourists will visit East Asia Pacific and South Asia; in 2020, America will also provide more than 200 million outbound tourists, about 9% of them will visit East Asia Pacific and South Asia; in 2020, East Asia Pacific More than 400 million outbound tourists will be born in the region, and up to 80% of the tourists will visit nearby countries, and the number may exceed the expectation. From 2000 to 2020, the number of inbound tourists in China will grow at an annual rate of 8%. It is expected that by 2020, China will face 137 million foreign tourists and become the first tourist attraction [2].

2 Cloud Computing Overview Cloud computing is considered to be the third IT revolution after microcomputers and the Internet, and it is the inevitable trend of the development of information technology. The key to the continuous development and evolution of cloud computing as a technical support system lies in its openness, which enables the cloud to serve users in a standard and universal way. The lower the threshold of cloud computing capability, the more convenient it will be to use, and it can be more and more widely used. Open cloud computing capability not only brings convenience to users, but also enables the third party of enterprises to use open interfaces and services to provide more cloud computing services. It is an inevitable choice to adopt cloud computing technology as the underlying support for information fusion. Through the cloud, users can gather, understand users’ thoughts and behaviors through the Internet, gather all kinds of content on the Internet, produce and publish based on the Internet, and realize user centered content production and consumption. Through the cloud, we can ensure the fast online business, realize the natural growth of business, and survive the fittest. The infrastructure of cloud computing is based on the idea of SOA, which provides software and hardware resources as services to end users. Service developers provide more services by using the open interface provided by cloud computing platform, and mobile phone users can also customize services on cloud computing platform [3]. End user of tourism cloud: the user can obtain the information resources he wants through the application of computer, mobile phone, pad and other network devices, without having to master the cloud platform itself. There is no significant difference between the application services on the tourist platform and the previous tourism system. However, some services are not stored locally, but in the cloud. Moreover, these services

Research and Implementation of Intelligent Tourism Guide System

189

need to be purchased. A service level agreement (i.e. purchase contract) is signed with the cloud platform operator. When the service purchased by the user reaches the service life, or upgrades the service, or requires a new service. You need to purchase from the cloud service platform.

3 Crisis Design of Recommendation Algorithm Based on Tourists and Scenic Area Information The specific design of the algorithm is as follows: (1) in the collaborative filtering algorithm based on users, firstly, the interest score matrix rsmxn of tourists and scenic spots is established. The matrix is the specific scores of different tourists on each scenic spot project. There may be a value of 0 in the matrix because the tourist has not scored the project or the tourist is a new registered user. The scoring matrix is as follows: ⎤ rsuls1 rsuls2 . . . rsulsN ⎢ rsu2s1 rsu2s2 . . . rsu2sN ⎥ ⎥ RSmxn = ⎢ ⎣ ... ... ... ... ⎦ rsuMs1 rsuMs1 . . . rsuMsN ⎡

(1)

The person similarity algorithm is used to calculate the similarity between the tourist ui and the tourist uj , such as Formula 1, rsui.sk represents the tourist ui interest value of the scenic spot project sk , and RSUI is the average value of the tourist ui score on all scenic spots in the matrix.  

 sk ∈ USui,uj rsui,sk − rsui rsuj,sk − rsuj sim ui , uj = (2)  2

sk ∈ USui,uj rsui,sk − rsui Among them, the value of ui and uj is very important. The higher the value of USui,uj the higher the similarity is. According to the algorithm in Lars, we calculate the cost of scenic spot project location to tourists, that is, travel penalty (U, I) represents the average distance between scenic spot project I and historical behavior record of tourists U. Then, the interest value of tourist u to item I is recalculated by formula 3. RecSore(u, i) = P(u, i) − TravelPenalty(u, i)

(3)

RecSore(u, i) is the final interest value. According to the value, the recommended list is filtered twice to get a more accurate information list and recommend it to users. Tourism cloud platform has been systematically planned and constructed, which can be divided into three forms: Tourism private cloud, tourism exclusive cloud and tourism public cloud. Then, it makes a specific research and Analysis on Tourism private cloud. In order to improve the efficiency of information recommendation, the recommendation algorithm based on the information of tourists and scenic spots is studied.

190

X. Yan and Z. Juan

4 Demand Analysis of Tourism Guide System With the improvement of human economic level and the rapid development of the Internet, the number and quality requirements of human outbound tourism are higher and higher. According to the statistics of the World Federation of travel agencies, people’s travel mode is gradually changing, and the proportion of free travel is increasing. And with the increasing negative news from travel companies and tour guides, tourists will choose more free travel. Tourists can get the tour information they need through the Internet, and then make their own tour itinerary. Tourism guide system can not only provide information of all directions of tourist attractions for tourists to search before going out; at the same time, tourists can also get the peripheral information they want at any time in the process of playing, so that tourists can make the most suitable play plan; so that tourists can publish their personal experience on the platform after the trip. 4.1 The Design of Tour Guide System The design of tourism guide system is divided into four parts: mobile application layer, tourism service layer, tourism data layer and infrastructure layer. The mobile application layer is only the function interface and control of the system terminal, which is responsible for displaying the scenic spot information, navigation information and strategy information to the user in the form of text, picture and video; when the user requests, it is transmitted to the tourism service layer through the encrypted and secure channel, so as to carry out the corresponding business logic processing; then, by accessing the tourism data layer, the data is transferred from the result of processing is obtained in the library and finally presented to the end user; the infrastructure layer is the tourism cloud platform environment. The design of information management service can be from the perspective of the users of the service. The users of the service system include the users of the system and the managers of the system. The users of the system mainly include tourists, tourism companies and peripheral manufacturers; the system administrator is the system administrator. In this service, visitors can query the basic information of the scenic spot by registering their account on the client, including: scenic spot introduction, tour group information, peripheral manufacturer information, etc. System administrators, tourism companies, and surrounding manufacturers release tourism information through the open platform interface. At the same time, the system administrator also needs to manage the tourism information of scenic spots in a unified way to help scenic spots solve the problems of information sharing, security and expansion. The following is the specific implementation of each component class of the service. (1) Tourist information management the basic information of tourists is composed of address and contact information. Different users can have multiple addresses or contact information. The service includes functions of adding, deleting, modifying and checking, and these functions are applicable to all registered users of the system. As shown in the Fig. 1 below:

Research and Implementation of Intelligent Tourism Guide System

191

Fig. 1. Tourist information management class diagram

This paper introduces the design of tour guide system, including overall design, detailed design, database design, open interface design and so on. In the overall design, the level of the system is divided, and a detailed overview is given; in the detailed design of the system, the detailed design of each functional module is proposed; in the database design, not only the design overview of the key data table in the system, but also a detailed description of the authority control; at the same time, the system also uses rest The interface design of architecture makes the system have better maintainability and reusability.

5 Conclusions According to the current development situation of tourism industry, this paper proposes and designs the solution of smart tourism cloud, and realizes the tourism intelligent navigation system based on Android platform on the basis of tourism cloud. Firstly, the paper studies the system planning of tourism cloud platform, and analyzes the specific architecture of tourism private cloud platform. Then, according to the development criteria of software engineering, a complete intelligent tourism system is designed and implemented, which integrates information management service, tourism guide service, tourism strategy service and information statistical analysis service. Acknowledgements. A study on the civilization literacy of Chinese outbound tourists from multiple perspectives.

References 1. Yuliang, S., Li, P.: Research on tourism informatization based on cloud computing platform. Inf. Technol. Inf. 12, 87–89 (2014)

192

X. Yan and Z. Juan

2. Feng Ling, L., Ning, L.: Development environment and trend of tourism in the 12th Five Year Plan. Econ. Issues Explor. 9, 24–28 (2011) 3. Liu, J., Fan, Y.: Composition, value and development trend of smart tourism. Chongqing Soc. Sci. 16(10), 121–124 (2011)

Analysis of Financial Needs of New Agricultural Operators Based on K-Means Clustering Algorithm Xiaohui Li(B) Department of Accounting and Statistics, Weifang Engineering Vocational College, Weifang 262500, Shandong, China [email protected]

Abstract. There are more levels and varieties of financial needs for the new agricultural operation entities. This paper introduces the current situation of the rural financial supply and the development of the new-type agricultural operation subject, analyzes the financial demand of the new-type agricultural operation subject, and puts forward some policy suggestions to meet the financial demand of the newtype rural operation subject. Clustering analysis is an important research topic in data mining. The goal of clustering is to aggregate data into different classes (or clusters) according to the similarity of data without any prior knowledge, so that the elements in the same class are as similar as possible. Keywords: New agriculture · Business subject · Financial demand · Cluster analysis

1 Introduction The formulation of “new type of agricultural operation subject” appeared earlier in some theoretical research and policy research articles, but it was officially proposed and received high attention after the 18th National Congress of the Communist Party of China. Agricultural operation subject refers to any individual or organization directly or indirectly engaged in the production, processing, sale and service of agricultural products. Although 2012 Since, the “new agricultural operation subject” has continued to appear in official documents, such as the opinions on speeding up the construction of policy system to cultivate new agricultural operation subject issued by the general office of the CPC Central Committee and the general office of the State Council, which is also a high-frequency vocabulary for the research of “agriculture, rural areas and farmers”, but at present, there is no authoritative concept of “new agricultural operation subject”, which mainly refers to family farms, large farmers, professional cooperatives and agricultural enterprises as the main development types of new agricultural operation [1]. In fact, there is no essential difference between family farms and large-scale farmers, so this study does not strictly distinguish family farms and large-scale farmers. The new type © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 193–198, 2021. https://doi.org/10.1007/978-3-030-62746-1_28

194

X. Li

of agricultural operation subject has become the forerunner of agricultural supply side structural reform, with significant income effect and employment effect, but it still faces many development bottlenecks and problems. In terms of financial support, it is mainly reflected in financing difficulties and other issues. Scholars have done a lot of research on the financial support of the new agricultural operation subject, including whether the financial support can promote the cultivation of the new agricultural operation subject, the analysis of the financial supply and demand of the new agricultural operation subject, the analysis of the financing dilemma of the new agricultural operation subject, and the innovative financial support.

2 Whether Financial Support Promotes the Cultivation of New Agricultural Operation Subjects In order to cultivate a new type of diversified agricultural operation subject, we need to innovate the agricultural operation system and mechanism, and increase the support of production factors such as rural finance. In terms of the mechanism of financial support for the new type of agricultural operation subject, sun Yongzhi and others believed that financial support is conducive to increase agricultural investment, improve the level of rural human capital, improve the level of agricultural technology, promote the transformation of agricultural production mode, promote the transfer of agricultural labor force, etc., so as to promote the development of rural economy. In terms of the scope of different financial types, Wang Yantao and others used the survey data of farmers in Jiaozhou City, Shandong Province, to demonstrate the impact of Rural Finance on the cultivation of new agricultural business entities [2]. It is found that the general finance provided by the government, the special finance provided by the financial institutions and the self owned funds of the new agricultural operation entities have different influences on the cultivation of different types of new agricultural operation entities. Among them, general financial support has a positive and promoting effect on the cultivation of family farms, farmer cooperatives and large farmers, but has no significant impact on agricultural enterprises; special financial support has a significant positive impact on the cultivation of agricultural enterprises, family farms and farmer cooperatives, but has no significant impact on the cultivation of large farmers; Self owned funds have a positive and significant impact on the cultivation of several major new agricultural business entities. Jiang Xianli, et al. Investigated the theoretical correlation and practical situation of the cultivation of new agricultural operation subjects and their financial services in China, and evaluated the financial service performance of the cultivation of new agricultural operation subjects by factor analysis. The results show that in the process of cultivating new agricultural operators, the overall performance level of fiscal and financial services to support agriculture has improved significantly, which ensures that China’s grain output increases for many years in a row under the condition of a significant reduction of agricultural labor force, and makes a positive contribution to the national food security. The study confirmed the positive role of financial finance in the cultivation of new-type agricultural operators, but it is still questionable to regard financial finance as an important influencing factor of grain production under the condition of labor force reduction in China. Hong Zheng compared and analyzed the supervision

Analysis of Financial Needs of New Agricultural Operators

195

efficiency of all kinds of new rural financial institutions and its impact on rural financing. The results showed that mutual supervision and contract interconnection can be effectively implemented by mutual fund cooperatives compared with commercial banks and small loan companies, and the joint development with professional cooperatives or leading companies can significantly improve rural financing.

3 Clustering Clustering is a basic cognitive activity of human beings. Clustering is widely used. Including pattern recognition, data analysis, image analysis, and market research. Clustering is to divide data objects into several classes or clusters. The principle of clustering is that objects in the same cluster have higher similarity, while objects in different clusters are larger. 3.1 K Average Algorithm K-means algorithm, also known as k-means, is the most widely used clustering algorithm. K-means algorithm takes K as a parameter, and divides an object into K clusters, so that the similarity within the clusters is high, while the similarity between clusters is low [3]. Firstly, the algorithm randomly selects K objects, each of which initially represents the average or center of a class. For each remaining object, it is assigned to the nearest cluster according to its distance from the center of each class. The average of each cluster is then recalculated. This process is repeated until the criterion function converges. The criterion functions are as follows: E=

K    − 2  x − xi  i=1 x∈Ci

Here e is the sum of the square errors of all objects in the database, x¯ i is the point in the space, representing the given data object. One is the average value of class Ci . This criterion tries to make the generated result classes as compact and independent as possible. Input: number of clusters k and database containing ten objects Output: k clusters, minimum square error criterion (1) Assign initial value for means; // select any k objects as the initial cluster center (2) REPEAT (3) For j = l to n do assign each  xj to the cluster which has the closest mean xi /|Ci |; //average of updated clusters (4) FOR i = l to k DO x¯ i = x∈Ci

(5) Compute E=

K  

  − 2  x/x − xi  ; // calculation criterion function e

i=1 x∈Ci

(6) UNTIL E no longer changed significantly; See Fig. 1 for the specific process.

196

X. Li

Fig. 1. Clustering process of a group of objects in kedingk average method

4 Analysis of Financial Supply and Demand of New Agricultural Operation Subject The main financial needs of the new agricultural operation entities are credit demand, insurance demand and Futures (b), which can be divided into productive financial demand and living financial demand according to their purposes. Ma Yanni et al. Studied 245 major apple loan fund uses in 11 counties, 36 townships and 82 villages in Shandong, Shaanxi and Shanxi Province, and found that major apple loan uses are relatively scattered and diversified, among which formal loan uses are mainly productive loan uses, informal, loan production and living uses are equally important. There are also other scholars The productive lending of households is studied. Yu Bo and Wang Jia research show that the main purpose of family farm financing is productive expenditure. But for the agricultural listed company, which is a new type of agricultural operation subject, the situation is special. After studying the investment direction of the raised funds of the listed agricultural companies in China, Xing Suyuan found that the phenomenon of backfarming investment is very common. The funds are mainly used in non-agricultural industries, such as real estate, biopharmaceutical and other high-risk and high-yield industries. At the same time, there are a considerable number of companies that idle the funds raised for agricultural projects and have the characteristics of mass distribution. The financial needs of the new type of agricultural operators are diversified. The new-type agricultural business entities applying for loans generally have credit needs, but those unexpressed or hidden credit needs will be ignored only based on this standard, such as the credit needs suppressed due to the mortgage guarantee requirements of financial institutions, the high cost of credit transactions, and the unwillingness to bear the potential risk of loss of collateral or failure to repay loans. Mushinski divides the credit demand of farmers into three categories: nominal credit demand, effective credit demand and potential credit demand, and puts forward the mechanism to identify and classify them. Zhou Yang used this analysis framework for reference to analyze the current situation and characteristics of credit and demand in the development of new agricultural business entities in Liaoning Province. Taking Sichuan Province as the research area, Wang Qiang et al. Analyzed the financial demand characteristics of the new agricultural operation subject, mainly including: strong willingness to borrow, relatively single borrowing channel, centralized use of borrowing, borrowing cycle in line with the growth cycle of

Analysis of Financial Needs of New Agricultural Operators

197

agricultural products, high actual borrowing rate, large demand for loan amount, etc. Based on the analysis of the characteristics of the new type of agricultural operation subject, sun Ligang and others proposed that the new type of agricultural operation subject has new characteristics in financing demand, such as diversification of financing demand, coexistence of long-term and seasonal financing demand, and no financing cycle. Huazhongyu et al. Found through the investigation of 6 poverty-stricken counties in Gansu, Guizhou, Anhui provinces that the rural credit cooperatives are the main channel of financing for the new agricultural operation subject in poverty-stricken areas, and the new agricultural operation subject has a strong demand for loan for mortgage guarantee, and has the characteristics of large-scale financing amount and diversified use. Different types of new agricultural operators are also subject to different credit constraints. Using Heckman’s selection model to study the credit demand, formal credit constraint and capital gap of new agricultural operators in Yangling Demonstration Area of Shaanxi Province, she found that different operators have different credit demand, credit constraint and capital gap in terms of resource endowment, operation ability and social capital. Compared with ordinary farmers, large growers and family farms, agricultural cooperatives and agricultural enterprises have more extensive collaterals and social capital, so they are subject to less formal credit constraints, resulting in a relatively small capital gap. In terms of specific types of new-type agricultural operation entities, Liu Mingxuan, etc. made use of the sampling survey data of 10 provinces in China to analyze the demand for financial services and its influencing factors from two aspects of demand degree and demand type of farm type farmers, households, ordinary farmers with agriculture as the main part, and ordinary farmers with agriculture as the auxiliary part. It is found that the current demand for financial services of Chinese farmers is mainly concentrated in two aspects: loan service and insurance service. From the perspective of the demand for financial services, farm farmers are more and stronger than the latter, and the demand for loan service is the strongest in the demand type. The study points out that the type of farmers and regional variables are important factors affecting the demand of financial services.

5 Conclusions Throughout the current research on the financial support of new agricultural operators, most of the studies analyzed the overall financial support of new agricultural operators, but most of them were case studies. On different types of new agricultural management subjects. Research on financial support is still lacking. In the future, we should strengthen the research on the financial support of new agricultural operation subjects from the following aspects: ➀ financial needs and influencing factors of different types of new agricultural operation subjects; ➁ financial risks and risk management; ➂ financial product innovation under the background of “Internet +”; ➃ research on the construction of mortgage guarantee system; ➄ research on the construction of credit evaluation system.

198

X. Li

Acknowledgements. Research project of Weifang Engineering Vocational College in 2019 (Research on financing difficulties and countermeasures of New agricultural operation subject under the background of Rural revitalization – Taking Weifang city as an example) supporting achievements (20190712).

References 1. Yizhen, Z.: The current situation and development trend of the main body of agricultural management in China. Xinjiang Agric. Reclam. Econ. (5), 7–9 (1998) 2. There is no essential difference between family farm and major professional household. finance China net [EB/OL] 3. Zhaoyang, L.: Research on the welfare effect of the development of new-type agricultural operation subjects. Res. Quant. Econ. Technol. Econ. 6, 41–58 (2016) 4. Zuhui, H., Ning, Y.: New type of agricultural operators: current situation, constraints and development ideas – an analysis of Zhejiang Province as an example. China’s Rural Econ, 10, 16–26 (2010) 5. Kong, X.: The role of cooperatives in the new type of agricultural operation. China Farmers’ Cooperatives 11, 29 (2013)

Research on the Application of Virtual Network Technology in Computer Network Security Zhou Yun(B) and Lu Rui Wuhan Institute of Shipbuilding Technology, Wuhan 430050, Hubei, China [email protected], [email protected]

Abstract. With the continuous progress and development of society, China has gradually entered the era of information society. Nowadays, the popularity of Internet and computer is no longer the luxury in the past. The sharing degree of information resources has greatly exceeded people’s imagination. People have adapted to the convenience brought by the high-tech information age. And the development of computer network has entered a white hot stage of development, but there will be some corresponding problems in the process of development, which makes many experts puzzled. The virtual network technology in the computer network security has been the central topic that experts have been discussing, so this paper will discuss the virtual network technology in the computer network security. Mainly from the computer network security in the current development situation of virtual network technology, characteristics of specific content, type classification, factors affecting its development, future development prospects and its main specific forms of application to do a detailed explanation, hoping to help more scholars analyze the relevant computer network security in the virtual network technology application content. Keywords: Computer network security · Virtual network technology · Application research

1 Introduction Computer has become an irreplaceable important thing in today’s society, its own role has been gradually magnified by the relevant experts. Today’s computer can be used in many aspects of the content, and not only has prominent auxiliary features in work, but also can effectively improve people’s quality of life in life, so the computer has been widely used It is not only a tool, it has been gradually intelligent, and is expected to move forward in a new direction. However, in the process of development, there will always be a lot of troubles and obstacles. The Internet can play the role of computer to the extreme, and at the same time, it can directly reveal the various drawbacks of the computer. Computer network security is another new challenge brought by the Internet to computer development. The virtual network technology in computer network security is one of the hot topics that experts study nowadays [1]. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 199–204, 2021. https://doi.org/10.1007/978-3-030-62746-1_29

200

Z. Yun

2 Current Development Situation of Virtual Network Technology in Computer Network Security Compared with other network technology means, virtual network technology in computer network security has a certain positive significance in the process of practical application, but for some technical fields, it is still only the content form at the basic level. If we continue to deepen the development, there will be some restrictive problems. The computer network security problem is not only the general security content work. It is a factor directly related to the vital interests of users. If we fail to recognize this point, we will make major mistakes in this aspect in the future. Nowadays, the computer network is very powerful, it can almost make people find any information and data they want to find in the computer network. However, if the resources are too strong, there will be some prominent problems. The network security problems have not been effectively controlled, which is why. Therefore, we need to apply the virtual network technology in computer network security to further improve the problem of negligence in this respect. The process of handling affairs needs to be standardized. It is not allowed to be too arbitrary or not to be carried out according to the rules and regulations. But now the application of virtual network technology in computer network security is not very optimistic, there are problems in the mainstream direction of deviation and application of not hard. Examples will be relatively easy to understand: for example, a person’s information is exposed on the network, but due to the special identity of this person, so far it has a serious adverse impact on society. Everyone’s identity information is the most important information. Once used by lawless elements, it will cause great harm to the victims and even cause huge loss of property. Moreover, once it is rendered by public opinion, the ability of relevant units to handle affairs will be questioned, and the social situation will become worse The network technology needs to be further improved and standardized [2].

3 Influence Factors of Virtual Network Technology in Computer Network Security 3.1 Influencing Factors of Unauthorized Access Illegal authorized access refers to the illegal and criminal behavior of visitors who, without the permission and authorization of users, gain personal or enterprise computer access rights by writing programs and changing programs without authorization, enter computer internal network programs, view and plagiarize important confidential documents such as data and resources. Its main purpose is to change the program to obtain access rights and other special rights, and some illegal visitors will damage the entire system of the user’s computer, resulting in the paralysis of the system, resulting in the user’s loss of huge property. 3.2 Natural Factors of Influencing Factors There are many kinds of natural factors, such as common natural disasters, aging of equipment after a certain period of service, electromagnetic radiation and other natural

Research on the Application of Virtual Network Technology

201

factors. This kind of force majeure factors often cause direct damage and damage to the computer, but there are also some factors that only play indirect damage. The computer itself is a mechanical object afraid of water and fire, so natural factors are often the content requirements that need to be more careful. 3.3 Computer Virus Influencing Factors When it comes to computer viruses, we will not feel strange, and we have more contact in our life. Computer virus is mainly through the computer itself to destroy and change the degree, especially to the computer internal important data and information for damage, resulting in the computer can not be normal use and operation, as well as instructions on the unrecognized and other unconventional error code. Chi virus once made people lose their courage for a period of time. It can directly destroy all the system files on the disk, and further infect all the logical drives on the disk. This virus starts from the main boot area of the hard disk and gradually infects the hard disk with garbage virus until all the data in the disk are damaged. Its destructive power is far more than that. It will also destroy the BIOS in the motherboard and return the CMOS parameters to the factory settings. If the user’s CMOS is flashrom, the motherboard can no longer be used. Therefore, this virus is extremely destructive. We should pay attention to it. Computer viruses not only exist Chi virus, but also Yai virus, Christmas virus, funlove virus and so on [3]. 3.4 Trojan Horse Program and Backdoor Trojan horse program and back door is a kind of hacker intrusion technology, which is the earliest computer hacker technology found by people. At that time, hackers often used the back door technology to carry out many illegal infringement activities on the computer. The main damage program of the hacker was to control the system administrator first, let him remove the blocking authority, and make himself invisible. It could not be easily found by the system administrator, which reduced the time for illegal intruders to steal information. Later in the development, people also called this trojan horse as Trojan horse. This kind of remote control technology is one of the backdoor technology. Hackers can use this technology to control computer programs directly, and it has certain illegal authorization and concealment. Trojan horse generally includes basic control program and server program.

4 Network Model of Virtual Network Mapping Physical topology is usually represented by weighted undirected graph GS = (NS , ES ): each physical node ns has attribute set a (NS ), including CPU resource C (nS ) and geographical location loc (NS ), each physical link eS has attribute set A (es ), including bandwidth resource B (es ); virtual network topology is also represented by weighted undirected graph Gv = (Nv , Ev ), and also has its own attribute set. In order to reduce the complexity of virtual network mapping, most algorithms divide virtual network mapping into two stages: node mapping and link mapping. For virtual node mapping,

202

Z. Yun

each virtual node should be able to map to a physical node. For virtual link mapping, it depends on whether the flow is separable. The flow is separable. Virtual link can adopt multiple physical path mapping, flow is not separable, and virtual link can adopt single path mapping. Since the main resource of a node is CPU, the main resource of a link is bandwidth. Therefore, when introducing the mathematical model of node mapping and link mapping, only CPU is considered for node constraints and bandwidth is considered for link constraints. Virtual nodes in different virtual networks can be mapped to the same physical node, but virtual nodes in the same virtual network must be mapped to different physical nodes. Each virtual node is mapped to a different physical node, which is represented as      Ri Ri Ri Ri FN : NV → NS ⊆ NS : NS = ns ∈ NS RCPU (nS ) min C(nV )  nV ∈NVRi NSRi indicates that there is at least one physical node in the set, and the remaining CPU resources of the physical node can meet the CPU mapping requirements of one virtual node in the virtual network request RI. The remaining CPU resource (Rcpu (nS )) of a physical node is defined as the total CPU of the physical node minus the CPU that has been mapped and used by the node:  RCPU (nS ) = C(nS ) − C(nV ) ∀nV ↑nS

Each virtual link is mapped to a different physical path:      Ri Ri Ri FRi N : EV → PS ⊆ PS : PS = P ∈ PS B(P) ≥ minRi B(eV ) eV ∈EV Among them, PSRi indicates that there is at least one physical path in the set, and the remaining bandwidth of the physical path can at least meet the bandwidth mapping requirements of a virtual link in the virtual network request Ri. The set of physical paths is represented by PS , in which the source node is n and the destination node is ns , which can be expressed as PS (nS , nt ). The available bandwidth B (P) of the physical path P is equal to the available bandwidth of the link with the least remaining bandwidth on the path B(P) = min RBW (es ) es ∈P

The remaining bandwidth resource RBW (es ) of a physical link is defined as the total bandwidth of the physical link minus the bandwidth used by the link:  RBW (es ) = B(es )− B(eV ) ∀eV ↑eS

Research on the Application of Virtual Network Technology

203

5 Application of Virtual Network Technology in Computer Network Security 5.1 Application of Virtual Network Technology in Computer Network Security Between Customers and Enterprises The application scope of virtual network technology in computer network security is relatively wide. It involves many fields, which makes the computer network security become an important bridge between enterprises and customers. How to do a good job in computer network security is the key to the current primary problem, which will bring about cooperation between enterprises and customers Huge economic security. The application performance of virtual network technology in computer network security between enterprises and customers is reflected in the following aspects: first, in the cooperation between enterprises and customers, there is often the sharing of resources, data and files. By using the virtual network technology in computer network security, we can effectively ensure that these important information contents are not easy to flow out or be illegally divided Children get and use them. Second, if we can effectively apply the virtual network technology in computer network security, we can further strengthen the function of firewall setting. Try to perfect some protective settings, such as information verification and password update. These can not only reduce the communication obstacles, but also ensure to find the source of the problem in time, so as to solve the problem immediately and reduce the loss and trouble. Third, this virtual network technology in computer network security can temporarily set up client login to facilitate data search and utilization during access, promote cooperation and communication between both sides, improve work efficiency, maximize economic benefits, and avoid waste and loss of resources. 5.2 Application of Virtual Network Technology in Computer Network Security Between Enterprise Departments and Remote Departments The virtual network technology in computer network security has been widely supported by many people. In today’s computer network security development process, although the virtual network technology has been used, there are still some problems. Therefore, in the future development, we should pay attention to the application of this technology between enterprise departments and remote departments, so as to not only coordinate the specific work content between the two sides, but also effectively control the overall development of the whole. Once hackers and viruses attack, emergency treatment and rescue measures can be implemented in time to avoid the deterioration of the problem. In order to achieve the best resource sharing of enterprise information, enterprises should apply the virtual network technology in computer network security to effectively connect various enterprise departments and remote branches. This cross regional management mode can help enterprises to achieve strict control. The virtual network technology in hardware computer network security not only has strong encryption, but also is not easy to be destroyed, and has high efficiency.

204

Z. Yun

6 Conclusions The popularization of computer application is well-known, it can not only bring convenience to people’s life and work, but also create favorable conditions for the development of the Internet. The sharing development mode of information resources has gradually moved towards the conventional development process. But the network security problem also along with produces, illegally obtains the access authority, the computer virus invasion and some network hacker’s “rampant” has become the core hot topic of the network security question today, also brought the new challenge chemical work content to the expert in this aspect. This part of the problem is often difficult to root out, has been causing great trouble to customers, and the virtual network technology in computer network security is an important measure to solve these problems. In the computer internet security, it can effectively improve the efficiency of resource sharing among various users, reduce the waste of cost, and improve the computer network security problems. Therefore, only by fully studying the virtual network technology in computer network security can we really speed up the future development process of computer network security.

References 1. Qian, Z., Wei, W.: Analysis of the effect of virtual network technology in computer network security. Value Eng. 2014(35), 196–197 (2014) 2. Chuanyang, L.: Application of virtual network technology in computer network security. Inf. Comput. (Theor. Ed.) 2015(12), 114–115 (2015) 3. Li, M., Hongjie, L.: Application of firewall technology in computer network security. Comput. Knowl. Technol. 2014(16), 3743–3745 (2014)

Application of Bionics in Underwater Acoustic Covert Communication Kaiwei Lian, Jiaqi Shen, Xiangdang Huang(B) , and Qiuling Yang School of Computer and Cyberspace Security, Hainan University, Haikou 570228, China [email protected]

Abstract. In order to overcome the problems brought by traditional covert communication methods, based on bionics, this paper adopts real or simulated dolphin calls as communication signals to achieve the effect of covert communication and completely solving the safety problem of underwater covert communication. The main work of this paper is as follows: Step 1: Analyze the sound characteristics of cetaceans and classify them according to their sound characteristics. Create and store the database of these calls. Step 2: Analyze the actual application scenario, refer to our research and application, and select bionic signals from the database. Step 3: After the sound source is generated, select the appropriate modulation scheme. Step 4: Refer to the modulation scheme and channel characteristics, adopt appropriate channel estimation and equalization. Finally, the signal is extracted by any suitable receiver. Keywords: Underwater acoustic communication · Bionics · Covert communication · Dolphin whistle · Dolphin tick-tock

1 Introduction 1.1 Application Background With the development of modern detection technology, higher requirements are put forward for underwater combat platforms, especially for concealed underwater acoustic communication. The poor concealment of underwater acoustic communication is easy to expose the launching platform and lose the concealment advantage of underwater warfare. Therefore, it is very necessary to study the concealment of underwater acoustic communication. The probability of detection and interception is proportional to the SNR. The high signal level exposes the communication platform. Therefore, the traditional hidden underwater acoustic communication is usually carried out under the condition of low SNR. However, with the decrease of SNR, the reliability of the system will be greatly reduced.

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 205–210, 2021. https://doi.org/10.1007/978-3-030-62746-1_30

206

K. Lian et al.

2 Existing Challenges and Suggested Solutions Traditional covert underwater acoustic communication is mostly realized by low SNR. The combination of low SNR covert communication and multi-carrier modulation technology is a research direction of low SNR underwater acoustic communication. GeertLeus et al. proposed a low SNR covert communication technology combined with OFDM modulation technology. In this communication system, the communication signal bandwidth is 3.6 kHz and is divided into 16 sub-bands. Experimental results show that when the SNR is reduced to −8 dB, the communication distance can reach 52 km and the communication rate is 78 bit/s. However, when the signal-to-noise ratio is too low, the communication system will collapse due to incorrect decoding [1, 2]. Document [3] also combines multi-carrier modulation to realize covert communication, and adopts turbo coding, frequency diversity and adaptive multi-band equalizer joint equalization technologies to further improve receiver performance. Although many scholars have made extensive research on low SNR covert communication, in the actual detection process, passive sonar can still detect such communication signals by long-time integration, especially in the position close to the sound source. Different from low SNR covert underwater acoustic communication, biomimetic covert communication emphasizes the method of biomimetic camouflage to induce the enemy to exclude the received signal and achieve the covert effect. Based on this idea, domestic and foreign scholars have carried out research on biomimetic camouflage concealed underwater acoustic communication. The advantage of this communication is that the enemy can detect the signal, but in the process of identification or classification, it will be excluded because it is the same as the original ocean noise. 2.1 Structure of the Paper This paper focuses on the underwater acoustic communication of dolphin-like calls. The first chapter mainly introduces the research background of the thesis. The research status of low SNR covert underwater acoustic communication and bionic camouflage covert underwater acoustic communication at home and abroad are introduced respectively. The location and recognition function and communication function of dolphin sonar system are studied. The dolphin call signals are classified and introduced, and the signature whistle hypothesis is explained. The second chapter discusses the related work, analyzes and reviews the existing literature on the application of hidden underwater acoustic communication, and summarizes the shortcomings of the current work. The third chapter puts forward the suggested solutions: the first step, noise reduction and extraction of dolphin calls are proposed. In the second step, a dolphin-like whistle underwater acoustic communication is proposed. In the third step, underwater acoustic communication imitating dolphin ticking is proposed. 2.2 Related Work Traditional covert underwater acoustic communication methods mostly start from the angle of low signal-to-noise ratio, hiding signals in ocean background noise to achieve the effect of LPI/LPD (Low Probability of Interception/Detection). Document [1, 2]

Application of Bionics in Underwater Acoustic Covert Communication

207

proposes a multi-band OFDM modulation technique applied to low signal-to-noise ratio. Frequency diversity technique is used to improve the communication effect under low signal-to-noise ratio. The bandwidth in this system is 3.6 kHz and is divided into 16 sub-bands. When the communication distance reaches 52 km, the communication rate is 78 bit/s, the signal-to-noise ratio can be reduced to −8 dB, and under the condition of low communication rate, the signal-to-noise ratio can reach −16 dB. However, if the signal-to-noise ratio is too low, the communication system will collapse because the communication signal cannot be detected. Document [4] proposes an energy detector that is insensitive to phase jump based on spread spectrum technology. Using sea trial data, the correct demodulation of the data can be realized under the condition of the lowest signal-to-noise ratio of −10 dB. Document [5] estimates the time-varying channel impulse response using matched filter technology in the demodulation of spread spectrum signals, and the bit error rate is less than 10-2 under the condition of signal-to-noise ratio of −12 dB. Document [6, 7] uses incoherent underwater acoustic communication technology, and proposes biorthogonal modulation and biorthogonal differential phase shift keying, both of which use DSSS technology and RAKE receiver. However, although the traditional low SNR covert underwater acoustic communication method reduces the average power of the transmitted signal, compared with the detection sonar, on the one hand, long-time integration can still detect the existence of the communication signal. On the other hand, reducing the transmission power of the communication signal to realize covert communication limits the communication distance. Based on this problem, from the perspective of bionic camouflage [8, 9], this paper proposes a method that can realize hidden underwater acoustic communication in full range. Using pulse modulation technology [10, 11] for reference, the information symbol form is improved.

3 Proposed Solutions 3.1 Noise Reduction and Extraction of Dolphin Calls The noise reduction process is carried out according to the following steps: the first step is to use short-time Fourier transform to obtain the time-frequency spectrum image of dolphin whistle signal; the second step is to carry out smooth filtering to eliminate the high-frequency components in the image; the third step is to carry out direction selection filtering through a specific template to weaken the non target acoustic signal; finally, to suppress the harmonic of whistle signal to obtain a clear time-frequency spectrum of whistle signal fundamental wave. 3.2 Underwater Acoustic Communication with Dolphin Whistle Composition of Whistle Signals. Dolphin whistle signal is an AM and FM harmonic signal, which can be expressed by a set of weighted sum FM sinusoidal signals as follows: R  ar [n] sin(2π ϕr [n]). s[n] = r=1

208

K. Lian et al.

Assuming a range of data, the signal is stationary. Using a window length of L, we can obtain the M th data block energy of the R th harmonic, Short-time Fourier transform. By using the interpolation method, the value of each sampling point in the block can be obtained, and finally the amplitude value of the Rd harmonic at each sampling point ar[n] can be obtained. The first harmonic energy of the whistler signal is larger than the second harmonic energy, but in a few sampling points, the second harmonic energy is larger than the first harmonic energy. Because the instantaneous frequency of a continuoustime signal can be expressed as a derivative of the phase, accordingly, the estimation of the phase of each sampling point can be expressed as an integral of the instantaneous frequency. Underwater Acoustic Communication Technology Based on Simulated Whistle Signal. In the traditional underwater acoustic communication method, LFM signal is used as frame synchronization signal. But in the bionic communication system, in order to achieve the effect of bionic communication, the traditional synchronous signal can not be used. In the bionic communication, the original Dolphin whistle signal is used as the synchronization signal, and the zero sequence is inserted between the original whistle signal and the bionic modulation signal as the protection interval, prevent Crosstalk between synchronization signal and data symbol caused by multipath. Imitation Whistle MSK Communication. MSK Signal is a special binary orthogonal 2FSK signal, in the process of signal change, can always maintain a constant envelope, phase continuous [12]. The simulated whistler MSK signal is composed of the timefrequency profile of the whistler signal and the MSK signal, and the communication information is loaded by the MSK signal.

3.3 Dolphin Click Underwater Communication M-Ary Dolphin Tick-Tock Covert Communication. According to the characteristics of the tick-tock sound, a certain number of real tick-tock sound signals are selected for time-delay difference coding. In the delay difference coding system, a series of signals are continuously transmitted at the transmitter to modulate the delay length between adjacent signals to represent the communication information to be transmitted [13]. On the basis of this, the m-ary spread spectrum tick-tock delay difference code [14] uses multiple tick-tock sound signals as transmitting signals and modulates the information by changing the delay difference of adjacent tick-tock sound signals within a certain range, to achieve bionic covert communication. In order to synchronize the signal at the receiving end, different whistling signals are added at the beginning and end of the modulated M-ary tick-tock signal, in which a protection interval is inserted between the synchronous signal and the data symbol, used to resist crosstalk between synchronous whistles and modulated signals due to the multipath effect of underwater acoustic channels, where the protection interval is usually represented by a zero series. Bionic Communication for UWB Signal. Ultra-wideband (UWB) signal is a narrow pulse impulse signal of nanosecond duration [15]. Ultra-wideband (UWB) communication, which uses UWB signal as information carrier, is a new radio communication

Application of Bionics in Underwater Acoustic Covert Communication

209

technology with good concealment, high processing gain, high multipath resolution, large system capacity, low power consumption and low cost. In order to overcome the detection of low-frequency Detection Sonar, the high-frequency and narrow-pulse wideband signal is used to imitate the Dolphin’s high-frequency tick-tock signal as the information carrier. Due to the characteristics of high frequency, wide band and narrow pulse, uwb signal has unique advantages in signal concealment and multipath resolution, so it is suitable for underwater acoustic communication. In time domain, the ticking signal of dolphins is a series of high frequency and narrow pulse signals with different time intervals. In order to simulate Dolphin tick sequences using ultra-wideband (UWB) signals, TH-PPM is used for information modulation.

4 Conclusions Based on the principle of bionics, from the perspective of bionic camouflage, this paper proposes to use the inherent biological call as the symbol to realize the covert underwater acoustic communication. First of all, the underwater acoustic communication technology of dolphin-like whistle signal is studied. Modeling and Synthesis of osazone Acoustic Signal based on sinusoidal signal model. Based on the SWH hypothesis, the real dolphin whistle signal is modulated by time-frequency profile, and the bionic communication is realized by time-frequency profile shift modulation, stretch modulation and MSK modulation. The modulation and demodulation method of communication signal is given. Secondly, the underwater acoustic communication technology of dolphin tick signal is studied. In this paper, m-ary spread spectrum tick-tock delay difference coding is proposed, which uses Real tick-tock signal to modulate delay difference, and uses m-ary spread spectrum coding to improve communication rate. The ultra-wideband (UWB) signal is used to simulate the high-frequency dolphin tick-tock signal, and the timehopping spread spectrum (TH-SS) technique is used to modulate multiple single pulses within each set of pulses according to the information bit transmitted, and each group of pulse as a whole PPM modulation. Acknowledgment. This work was supported by the following projects: the National Natural Science Foundation of China (61862020); the key research and development project of Hainan Province (ZDYF2018006); Hainan University-Tianjin University Collaborative Innovation Foundation Project (HDTDU202005).

References 1. Leus, G., Van Walree, P.A.: Multiband OFDM for covert acoustic communications. IEEE J. Sel. Areas Commun. 26(9), 1662–1673 (2008) 2. Leus, G., Van Walree, P., Boschma, J., Fanciullacci, C., Gerritsen, H., Tusoni, P.: Covert underwater communications with multiband OFDM. In: Oceans 2008, Quebec City, pp. 391– 398 (2008) 3. Van Walree, P.A., Leus, G.: Robust underwater telemetry with adaptive turbo multiband equalization. IEEE J. Oceanic Eng. 34(4), 645–655P (2009)

210

K. Lian et al.

4. Yang, T.C., Yang, W.B.: Low probability of detection underwater acoustic communications using direct-sequence spread spectrum. J. Acoust. Soc. Am. 124, 3632–3647 (2008) 5. Yang, T.C., Yang, W.B.: Performance analysis of direct-sequence spread-spectrum underwater acoustic communications with low signal-to-noise-ratio input signals. J. Acoust. Soc. Am. 123, 842–855 (2008) 6. Jun, L.I.N.G., Hao, H.E., Jia, L.I.: Covert underwater acoustic communications. J. Acoust. Soc. Am. 128, 2898–2909 (2010) 7. Ling, J., He, H, Li, J.: Covert underwater acoustic communications: transceiver structures, waveform designs and associated performances. In: Oceans 2010 MTS/IEEE Conferenc. Seattle, pp. 20–23 (2010) 8. Liu, S., Qiao, G., Ismail, A.: Covert underwater acoustic communication using dolphin sounds. J. Acoust. Soc. Am. 133(4), EL300–EL306 (2013) 9. Liu, S., Qiao, G., Ismail, A., et al.: Covert underwater acoustic communication using whale noise masking on DSSS signal. In: OCEANS 2013 MTS/IEEE Conference, Bergen, Norway, pp. 1–6 (2013) 10. Yin, J.: Study on pattern delay coded underwater acoustic communication in multipath channels. Harbin Engineering University, Harbin, pp. 18–39 (2007) 11. Yin, J.: A study of pattern time delay coding communication underwater acoustic multipath channel. Harbin Engineering University, Harbin, pp. 18–39 2007 12. Changxin, F., Fuyi, Z., et al.: Communication Principles, pp. 34–35. National Defense Industry Press, Beijing (2001) 13. Liu, S., Liu, B., Yin, Y., Qiao, G.M.: Dolphin-like barking concealed underwater acoustic communication method. J. Harbin Univ. Eng. 35(1), 119–125 (2014) 14. Shaozuo, L., Gang, Q., Yanling, Y.: A biomimetic underwater acoustic communication method using dolphin calls. J. Phys. 61(14), 291–298 (2013) 15. Changyuan: Research on signal generation and modulation technology of UWB wireless communication system. Master’s thesis, Harbin University of Engineering, p. 64 (2006)

Energy-Saving and Efficient Underwater Wireless Sensor Network Security Data Aggregation Model Shijie Sun1,2 , Dandan Chen2 , Na Liu2 , Xiangdang Huang2,3(B) , and Qiuling Yang2,3 1 Information and Communication Engineering of Hainan University, Haikou 570228, China 2 Computer Science and Cyberspace Security of Hainan University, Haikou 570228, China

[email protected] 3 State Key Laboratory of Marine Resource Utilization in South China Sea,

Haikou 570228, China

Abstract. Due to the inherent characteristics of resource constrained sensors, communication overhead has always been a major problem in underwater wireless sensor networks. Data aggregation is an important technology to reduce communication overhead and prolong network lifetime. In addition, due to the low bandwidth and high bit error rate transmission characteristics of underwater wireless media, underwater sensor nodes are more vulnerable to malicious attacks. Therefore, for such applications, data aggregation protocol must be energy-saving and efficient, and can prevent adversaries from stealing private data held by each sensor node. To solve this problem, this paper proposes an improved Energyefficient Slice-Mix-Aggregate (ESMART) algorithm, which dynamically adjusts the number of data slices according to the amount of data sensed by the sensor nodes, which makes the total data transmission volume in the network lower than that of SMART (Slice-Mix-Aggregate) algorithm, that is, it does not introduce significant overhead on the sensor with limited energy, while maintaining the data security. Keywords: Underwater wireless sensor networks · SMART algorithm · Data transmission

1 Introduction Underwater wireless sensor network (UWSN) is one of the emerging wireless technology fields which has been widely developed in recent years. It establishes an underwater network, which monitors and communicates through fixed or mobile sensors. However, compared with the land sensor nodes, the underwater network nodes have the characteristics of energy limitation. Therefore, the design of Underwater Wireless Sensor Network (UWSN) wireless communication protocol must consider the energy consumption performance [1]. On the other hand, security is a crucial issue in UWSN. Compared with © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 211–216, 2021. https://doi.org/10.1007/978-3-030-62746-1_31

212

S. Sun et al.

WSN, UWSN is more vulnerable because of its low bandwidth, large propagation delay, and high bit error rate. For this reason, [2] proposed a data privacy protection scheme which can recover the original mining data and verify the integrity of the data, but the data fusion delay of this scheme is high, which reduces the efficiency of network operation. In [3], a secure data fusion scheme using private seeds to protect private data is proposed. The scheme has low communication overhead and computing load, but the security intensity is not high, and there is a large security risk. In [4], a security data aggregation scheme of slicing, mixing and fusion is proposed. The data privacy protection performance of this scheme is better, but the communication overhead is huge. In conclusion, this paper proposes ESMART algorithm. The algorithm dynamically selects the number of slices according to the amount of data sensed by the sub nodes, which will greatly reduce the communication load and prolong the network life cycle. The uncertainty of raw data segmentation also increases the difficulty of the attacker to restore the original data, effectively ensuring the confidentiality and integrity of the data.

2 Related Work A lot of work has been done on data aggregation schemes in sensor networks, including [5–7]. All these works assume that all sensors are reliable and all communication is safe. However, in reality, sensor networks are likely to be deployed in an untrusted environment, such as underwater, so the link is easy to be eavesdropped, and the intruder may destroy the encryption key and manipulate the data. In order to ensure data security and reduce the amount of information transmission, an Energy-efficient and high-accuracy secure data aggregation (EEHA) is proposed in [8]. Compared with SMART, EEHA can significantly reduce communication overhead and improve the accuracy of data fusion. Besides, a High energy-efficient and privacypreserving secure data aggregation (HEEPP) is proposed in [9]. In slicing and hybrid technology, random distribution is introduced to determine the number of sliced data, to reduce the energy consumption of data collection and improve the security of data collection. In [10], Energy- efficient adaptive slice-based secure data aggregation (ASSDA) scheme is proposed. In this scheme, a node’s same data slice can only be sent once in the same time slot. ASSDA improves the efficiency of data slicing and reduces the energy consumption of nodes. By using the method of data decomposition, the number of slices is reduced and the communication cost is greatly saved. Based on the above analysis, this paper proposes the ESMART algorithm, which not only retains the good privacy protection performance of the SMART algorithm, but also reduces the traffic of the whole network.

3 System Model 3.1 Network Model In a 10000 * 10000 m underwater area, N sensor nodes are randomly distributed, and the following assumptions are made: 1) Node distribution density is random. 2) All nodes

Energy-Saving and Efficient Underwater Wireless Sensor Network

213

are assigned an ID to uniquely identify their identity in the network, and all nodes have the same initial energy. 3) Nodes can get their location data. 3.2 Clustering A common technology of data aggregation is to establish aggregation tree and cluster aggregation. It is a directed tree formed by the union of all paths from sensor node to base station. These paths can be chosen arbitrarily, not necessarily the shortest path. The optimization of cluster structure is not in the scope of this paper. According to different application requirements, there are various methods of clustering. The clustering method in this article is described in [11]. 3.3 Data Slicing 1) In order to save the energy consumption of cluster head, the cluster head node does not conduct data sensing and only performs data fusion operations; 2) The maximum number of slices preset by the system is recorded as N; 3) The amount of data collected by the sub-nodes in an induction cycle is different, before data segmentation, the amount of data collected by the sub-nodes is recorded as θ ; 4) Record 2/3 of the maximum amount of data that a single node can collect as ρ, if θ > ρ, the data will be divided into N pieces, otherwise the data will be divided into N−1 pieces; 5) The leaf node randomly keeps a data slice, encrypts the rest slices and sends them to its neighbor nodes. Set the preset maximum number of slices N to 3. Take node 3 in the figure as an example, node 4 divides the data into two slices, keeps one slice, with the slice number of d33 , and sends the remaining slice to node 0, with the slice number of d30 . Data segmentation and slicing of other nodes follow the same rules (Fig. 1).

Fig. 1. Data slicing

214

S. Sun et al.

3.4 Data Mixing The node decrypts the received data slice and performs hybrid operation with the remaining original slices stored locally to generate a new data packet. If M5 is the new data packet generated after hybrid operation of node 5, then can be obtained by M5 = d55 +d15 +d45 . Similarly, mixed data of other nodes can be obtained (Fig. 2).

Fig. 2. Data mixing

3.5 Data Aggregation The child node first encrypts the mixed result with the shared secret key, and then sends the encrypted data back to its corresponding cluster head nodes 0 and 6 respectively. The cluster head node will wait for a period of time so that all the leaf nodes can pass back the encrypted data. After receiving the encrypted data, the cluster head node decrypts it, merges it with the data slice it receives, and then encrypts the fusion result and continues to send it back to the base station (Fig. 3).

Fig. 3. Data aggregation

4 Model Analysis 4.1 Privacy Protection The ESMART scheme proposed in this paper limits the data sensing behavior of cluster head nodes. At the same time, it uses the segmentation technology based on the amount

Energy-Saving and Efficient Underwater Wireless Sensor Network

215

of data collected by nodes to dynamically adjust the number of data slices, so that the total data transmission in the network is far less than the SMART scheme. At the same time, we know that the lower the amount of data communication, the lower the probability of privacy data exposure. Secondly, the number of data slices in any sub-node of ESMART scheme is dynamically adjusted by the amount of data perceived by the sub node. Even if the attacker successfully attacks a certain point, it is still unable to determine whether he or she has heard all the data slices of the modified node, so it is impossible to determine whether the privacy data obtained by using the captured data is correct, which greatly increases the difficulty of the attacker to restore the original data. Therefore, the ESMART scheme proposed in this paper has better performance in privacy protection. 4.2 Communication Cost In SMART algorithm, the collected data is divided into N pieces before transmission, and N-1 pieces are distributed to neighboring nodes to generate N-1 packets, and the remaining one piece is reserved by itself. After the node data is mixed, the mixed data is transmitted to the upper node to generate one packet, so each node will generate N packets. Assuming that there are L nodes in the network, the total amount of data communication in the network is: K =N ·L

(1)

The improved algorithm proposed in this paper is that the cluster head node does not carry out data sensing and data segmentation, the cluster head node only generates one packet of traffic, the sub node’s segmentation of data is based on the uncertainty of the amount of data collected by the node, the proportion of the fusion node in the network is set as β, the probability of the leaf node dividing the data into N pieces is set as p, so the total amount of data communication in the network is: K = β · L + (1 − β) · L · N · P + (1 − β) · L · (1 − P) · (N − 1)

(2)

(1) and (2) can be obtained by subtraction: =β · L · (N − 1) + L(1 − β) · (1 − P)

(3)

Obviously,  > 0. Therefore, the data traffic of the whole network is greatly reduced, that is, the communication cost is greatly reduced.

5 Conclusion In this paper, we propose an energy-saving and efficient security data aggregation model for underwater wireless sensor networks. The model dynamically adjusts the number of data partitions according to the amount of data collected by the sub nodes, which ensures the data security without introducing significant additional overhead. Through the analysis of the model, we can find that the model provides good privacy protection for the original data with low cost.

216

S. Sun et al.

Acknowledgment. This work was supported by the following projects: the National Natural Science Foundation of China (61862020); the key research and development project of Hainan Province (ZDYF2018006); Hainan University-Tianjin University Collaborative Innovation Foundation Project (HDTDU202005).

References 1. Su, C., Liu, X., Shang, F.: Vector-based low-delay forwarding protocol for underwater wireless sensor networks. In: 2010 International Conference on Multimedia Information Networking and Security, Nanjing, Jiangsu, pp. 178–181 (2010). https://doi.org/10.1109/mines.2010.46 2. Chen, C., Lin, Y., Lin, Y., Sun, H.: RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 23(4), 727–734 (2012). https://doi.org/10.1109/TPDS.2011.219 3. Yoon, M., Jang, M., Kim, H.I., et al.: A signature-based data security technique for energyefficient data aggregation in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014, 1–10 (2014) 4. Wenbo, H., Xue, L., Hoang, N., Nahrstedt, K., Abdelzaher, T.T.: PDA: privacy-preserving data aggregation in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications, pp. 2045–2053 (2007) 5. Sattarian, M., Rezazadeh, J., Farahbakhsh, R., Bagheri, A.: Indoor navigation systems based on data mining techniques in internet of things: a survey. Wireless Netw. 25(3), 1385–1402 (2019) 6. Brown, S.: An analysis of loss-free data aggregation for high data reliability in wireless sensor networks. In: 2017 28th Irish Signals and Systems Conference (ISSC), Killarney, pp. 1–6 (2017). https://doi.org/10.1109/ISSC.2017.7983622 7. Liu, C., Liu, Y., Zhang, Z.J.: Improved reliable trust-based and energy-efficient data aggregation for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013(652495), 1–11 (2013) 8. Juan, L.H., Kai, L., Qiu, L.K.: Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks. Compiter Commmun. 34, 591–597 (2011) 9. Xun, L.C., Yun, L., Jiang, Z.Z., Yao, C.Z.: High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks. Int. J. Commun. Syst 26, 380–394 (2013) 10. Pengwei, H., Xiaowu, L., Jiguo, Y., Na, D., Xiaowei, Z.: Energy- efficient adaptive slice-based secure data aggregation scheme in WSN. Procedia Comput. Sci. 129, 188–193 (2018) 11. Madden, S., Franklin, M.J., Hellerstein, J.M.: TAG: a tiny aggregation service for ad-hoc sensor networks. OSDI (2002)

False Data Filtering in Underwater Wireless Sensor Networks Na Liu, Haijie Huang, Xiangdang Huang, and Qiuling Yang(B) School of Computer Science and Cyberspace Security, Hainan University, Haikou 570228, China [email protected]

Abstract. Nowadays, people pay more and more attention to the safety of Marine Territory and the development and utilization of marine resources. Underwater wireless sensor networks (UWSNs) [1] technology has become one of the hot research topics in the contemporary era. Underwater sensor nodes have the characteristics of poor defense ability, limited energy and easy to be breached. Once underwater sensor nodes are compromised by adversaries, the adversaries can use the sensitive information saved by the node to send false data injection attacks on legitimate reports. To address such attacks, this paper proposes a false data filtering strategy based on the basis nodes to mitigate the threat of these attacks. The strategy proposed not only improves the efficiency of network filtering and prolongs the network lifetime, but also reduces the energy consumption and resource waste. Keywords: Underwater wireless sensor networks · Network security · False data injection attacks

1 Introduction Underwater wireless sensor networks is a self-organized wireless communication network formed by randomly deploying a large number of micro sensor nodes to the monitoring water area and wireless communication between the nodes and autonomous underwater vehicle (AUV) [2, 3], the information of the sensing objects in the monitoring water area is sensed, collected and processed by cooperation between nodes, and then sent to the surface base station processing center (Fig. 1) [4]. The design of underwater wireless sensor networks should not only ensure the high efficiency and reliability of the network, but also consider the security of the network. Once underwater sensor nodes are compromised by adversaries, the adversaries can use the sensitive information saved by the node to send false data injection attacks on legitimate reports. At the same time, the energy saved by sensor nodes is limited, and malicious nodes constantly sending false data to the network will cause their own energy consumption, which will result in savings Point of rapid death. So it is very important to filter the false data in the underwater wireless sensor networks. In order to resist the false data injection attacks, Ye et al. [5] proposed a Statistical En-route Filtering mechanism (SEF). In the data collection stage, the Center-of-Stimulus © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 217–222, 2021. https://doi.org/10.1007/978-3-030-62746-1_32

218

N. Liu et al.

Fig. 1. Underwater wireless sensor networks.

(CoS) collects and summarizes the detection results by all detecting nodes, and produces a synthesized report on behalf of the group. Then, The cos then transfers the data to the sink node. This does not guarantee the authenticity and security of the data. Zhang Shuguang [6] proposed a false data filtering strategy based on neighbor node monitoring. In the phase of data packet generation, the cluster head node needs to communicate with the nodes in the cluster for many times to ensure the security of the data, and then the cluster head sends the data packets to the sink node in the form of single hop or multi hop. Due to the multiple communication between nodes, not only the energy consumption of nodes is large, but also the network life will be reduced. None of the above strategies involve underwater wireless sensor networks. It not only causes the energy consumption of nodes, but also shortens the life cycle of the network, which can not guarantee the security of data. In view of the above problems, we propose a false data filtering strategy based on the basis of the nodes. In the packet generation phase, Within the overlapping area S of each sensing node in the cluster, a node is selected as the base Si. The received data is filtered falsely based on Si. In the transmission process, the false data is filtered again. The sink node as the last line of defense for filtering. This paper is organized as follows. We survey related work on false data filtering in Sect. 2, We then describe our ideas and design in Sect. 3,We summarize this article in Sect. 4.

2 Related Work According to the different data encryption technologies used, the existing false data filtering schemes for sensor networks can be divided into five categories: (1) False data

False Data Filtering in Underwater Wireless Sensor Networks

219

filtering schemes based on symmetric keys; (2) False data filtering schemes based on public keys; (3) False data filtering schemes based on group key technology; (4) False data filtering schemes based on digital watermarking technology; (5) Filtering scheme based on time synchronization technology and time-varying parameters [7]. Symmetric key-based filtering is favored by sensor networks with limited energy because it not only has low computational complexity and energy consumption, but also is simple and practical to implement. Ye et al. [5] took the lead in proposing a Statistical En-route Filtering mechanism (SEF) by using symmetric key technology. During the data collection phase, the collected data is encrypted and transmitted directly to the CoS, and then forwarded by CoS to the sink node, which does not guarantee the security of the collected data. False reports may be forwarded in multiple hops before being filtered out, which wastes energy on nodes. Ting Yuan [8] presented a false data filtering for wireless sensor networks based on key chain. During the report generation phase, In order to ensure the data security, the nodes in the cluster and the cluster head need to transmit multiple times. Kim et al. [9] presented a fuzzy logic-based false report detection method (FRD). When an event occurs, the nodes together generate a report and attach their Mac to the report. The source node sends the report to sink. Even if some intermediate nodes find some wrong MAC reports, they can still be routed to sink until the threshold is reached. The fuzzy rule-based system on the sink is exploited to determine a threshold value by considering the number of false reports, the average energy of the forwarding path, and the number of MACs in the report. Zhang Shuguang [6] proposed a false data filtering strategy based on neighbor node monitoring. The receiving node filters the false data by listening to the upstream node. The false data packet will be filtered out within one hop. In the phase of packet generation, this method needs to pass through multiple nodes in the cluster to ensure the security and authenticity of the data. Liu et al. [10] proposed a geographical information based false data filtering scheme (GFFS). In the report generation stage, When an event happens, the CoS gets the location of the stimulus (Le) through the following way: First, it calculates the overlapping area (Do) of all the detecting nodes’ sensing areas, then it randomly picks one point S from Do as the approximate value of Le. The CoS then broadcasts its reading e to all the detecting nodes. Upon receiving e, a detecting node S checks whether e is consistent with its own sensing value. Then CoS generates a report R, and finally sends the packet R to sink node through single hop or multi hop. To sum up, in the existing false data filtering methods, nodes need to transmit data multiple times between the nodes in the cluster and the cluster head, or the cluster head encrypts the collected data and directly transmits it to the cluster head node, and then the cluster head transmits the data to the sink node. Data security and node energy consumption can not be both. At the same time, the above methods are not suitable for underwater wireless sensor networks.

220

N. Liu et al.

3 False Data Filtering Strategy Based on the Basis Nodes 3.1 Network Models and Related Assumptions Assuming that the sensing radius of the underwater wireless sensor networks nodes remains unchanged, the hierarchical clustering network is adopted in the network topology. In the cluster network, the cluster head knows the ID of the node in the cluster. Each node in the cluster transmits the collected data to the cluster head, and the cluster head generates the data packet, and transmits the data packet to the sink node or base station in one hop or multi hop mode, and the sink node or base station transmits the data to the water surface data center (Fig. 2).

Fig. 2. Network model diagram.

Assume that the network deployment and initialization phases are secure and not attacked. It is assumed that the location of nodes will not be changed in a large range after deployment, at the same time, it is ensured that nodes will not selectively discard data during transmission. It is assumed that sink node has strong security and it will not be captured. 3.2 False Data Filtering Strategy Based on the Basis Nodes Key Distribution. Similar to the SEF allocation strategy, sink maintains a global key pool composed of N keys. These keys are divided into M non overlapping partitions, each of which has Q keys. Each node selects t random keys from m partitions and stores them in the key space of the node together with the relevant key index. After the sensor node is deployed, each node recognizes any events it observes by generating a MAC on the report using its key. Packet Generation. The method consists of four steps: node selection, cluster-head data filtering, cluster head data comparison, and transmission filtering. First, in the overlapping area S of each sensing node in the cluster, select a node with high reputation value as the basis Si. In the overlapped area or the nearest node to the overlapped area is Si, U5 and U6 (Fig. 3). If the reputation value of Si node is the largest among the three nodes, then Si is selected as the basis node. When the event

False Data Filtering in Underwater Wireless Sensor Networks

221

occurs, each node in the cluster (including Si node and cluster head node) collects data and sends the data collected by each node in the cluster to the cluster head (including the base node Si).

Fig. 3. Abstract model of false data filtering schemes.

Second, after the cluster head node receives the data, it looks up its neighbor node list to determine whether the node number (ID) is its neighbor node, otherwise it discards the data collected by the ID node. Then, the cluster head node checks whether the number of nodes of the collected data is greater than T, if not, the data is collected again in the cluster. Third, Cluster heads compare the data collected by each node in the cluster based on Si. The comparison results retain the data within the specified error range. The cluster head checks whether the number of filtered nodes is greater than T, and if not, the data will be collected again in the cluster. Fourth, the cluster head node packs the filtered data into MR, and transmits MR to sink node in the form of single hop or multi hop, and filters the false data in the transmission process. As the last line of defense, sink node filters MR. En-Route Filtering. First, the node will judge whether to filter the packets according to the trust value of the upstream node of the forwarded packet MR. Secondly, the node will check whether the node forwarding MR is its own neighbor node, and verify the validity of one-way chain key in the packet. Then, the node checks whether the number of key index, ID and MAC in packet MR are equal to T. Then, the node checks whether the T key indexes come from T different key partitions. Then, the node checks whether there is the same key index as in MR. if there is the same key index, the node uses the key to verify its corresponding MAC. Then, the node checks the trust value of the upstream node forwarding MR, and determines whether to authenticate and then forward or forward and then authenticate MR. Then, within the specified time, the node monitors whether the last hop node sends ACK packets. Finally, the ID and one-way chain key of the sending node in MR are replaced by their own ID and new one-way chain key, and then they are forwarded to the downstream node, and the ACK packet is replied to the upstream node. Sink Verification. After the sink node receives the packet MR, the sink checks whether the number of keys, ID and MAC in the packet MR is equal to T. The sink node then determines whether there are two key indexes from the same key partition. The sink

222

N. Liu et al.

node has all the information of node ID and corresponding key, and finally filters out the missing false data.

4 Conclusions Aiming at the problem of excessive energy consumption in packet generation stage of the false data filtering strategy based on neighbor node monitoring proposed by Zhang Shuguang (2014), this paper proposes a false data filtering strategy based on the basis node. By analyzing our method, we can filter the false data significantly before the data packet is generated, which not only reduces the energy consumption and prolongs the network life cycle, but also ensures the data security. Acknowledgment. This work was supported by the following projects: the National Natural Science Foundation of China (61862020); the key research and development project of Hainan Province (ZDYF2018006); Hainan University-Tianjin University Collaborative Innovation Foundation Project (HDTDU202005).

References 1. Wan, L., Zhou, H., Xu, X., Huang, Y., Zhou, S., Shi, Z., Cui, J.H.: Field tests of adaptive modulation and coding for underwater acoustic OFDM. IEEE J. Ocean. Eng. 40, 327–336 (2015) 2. Wang, J., Chen, J.F., Zhang, L.J., et al.: Underwater wireless sensor networks. Acoust. Technol. 01, 91–97 (2009) 3. Luo, Q.: Research on deployment of underwater wireless sensor networks. National University of Defense Technology, Changsha (2011) 4. Liu, Z.H., Zheng, J.J.: Ocean monitoring system based on underwater wireless sensor networks, 11–16 (2017). http://kns.cnki.net/kcms/detail/61.1450 5. Ye, F., Luo, H., Lu, S., et al.: Statistical en-route filtering of injected false data in sensor networks. IEEE J. Sel. Areas Commun. 23(4), 839–850 (2005) 6. Zhang, S.G.: Research on false data filtering and malicious node location in wireless sensor networks. University of Science and Technology of China (2014) 7. Liu, Z.X.: False data filtering in wireless sensor networks. Central South University 8. Yuan, T.: Research on key management and false data filtering mechanism in wireless sensor networks. Fudan University (2009) 9. Kim, Lee, H.Y., Cho, T.H.: A fuzzy logic-based false report detection method in wireless sensor networks. Proc. Korea Simul. Soc. 17(3), 27–34 (2008) 10. Wang, J., Liu, Z., Zhang, S., et al.: Defending collaborative false data injection attacks in wireless sensor networks. Inf. Sci. 254, 39–53 (2014)

Research on Underwater Bionic Covert Communication Jiaqi Shen, Kaiwei Lian, and Qiuling Yang(B) School of Computer Science and Cyberspace Security, Hainan University, Haikou 570228, China [email protected]

Abstract. Due to the particularity of the underwater environment, underwater acoustic communication is an inevitable choice for underwater wireless sensor networks (UWSNs) communication. In recent years, with the development of underwater acoustic communication technology, the communication rate and communication quality of underwater wireless sensor networks have been greatly improved. At the same time, it has proposed the protection of the concealment of underwater equipment and the safety of underwater acoustic communication. New requirements. This paper reviews and summarizes the development status of underwater bionic covert communication. The analysis shows that the underwater bionic covert communication method using marine mammal vocalization as an information carrier has great advantages, which points out the direction for the research of underwater sensor network security communication. Keywords: Underwater acoustic communication · Covert communication · Underwater wireless sensor networks · Bionic communication · Information hiding

1 Introduction More than 70% of the earth’s surface area is the ocean, which contains many untapped resources and is a natural treasure trove of resources. However, the current development and utilization of the ocean is still in its infancy, and there is an urgent need for new technological means for ocean development. Underwater acoustic communication technology is a necessary means of information exchange in the process of ocean development and research. Underwater wireless sensor networks (UWSNs) are powerful tools for detecting and developing marine resources, and their development is of national interest. In recent years, our country has proposed to build a strong maritime country, continuously increase efforts in the development and utilization of marine resources, and propose the goal of building a digital ocean. In many emerging marine science and technology fields, underwater wireless sensor networks have attracted much attention because of their wide application in marine environment monitoring, marine life protection, seabed resource detection and development, and military fields. It is an inevitable choice for © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 223–228, 2021. https://doi.org/10.1007/978-3-030-62746-1_33

224

J. Shen et al.

real-time transmission of marine data [1–3]. Underwater wireless sensor networks generally include a variety of sensor nodes, AUVs, buoys, etc. deployed underwater, and the data exchange between different devices mainly through acoustic signals. In the past, research in the field of underwater acoustic communication mainly focused on solving the problem of underwater acoustic communication from scratch, aiming to improve the communication rate and communication quality of underwater wireless sensor networks, ignoring the protection of information security during transmission [4]. With the development of underwater detection technology, underwater sensors can detect more sensitive information of the hydrological environment, which is related to national security. How to ensure the safety of underwater acoustic communication is gradually becoming the focus of research. At the same time, excessive human underwater activities have also had a great impact on marine life. Studies have shown that the harmful effects of human activities on marine animals cannot be ignored [5]. In recent years, with the deployment and use of underwater sonar systems and underwater wireless sensor networks, some ecological events have occurred frequently. Therefore, research on high-speed, long-distance, secure, and environmentally friendly communication methods is the trend of a new generation of underwater acoustic communication technology.

2 Underwater Covert Communication 2.1 Overview of Underwater Covert Communication Covert underwater acoustic communication is the concept of stealth communication in an underwater acoustic environment. There are two main methods for realizing subtle underwater acoustic communication, including low signal-to-noise ratio (SNR) hidden communication technology and bionic hidden communication technology [6]. Low signal-to-noise ratio concealed communication technology is to spread the communication signal spectrum or reduce the transmission power of the communication signal to send the communication signal in the form of a low signal-to-noise ratio, thereby reducing the probability of the enemy finding the communication signal and achieving the purpose of covert communication. Low signal-to-noise ratio covert communication technology is a common means of underwater covert communication, and its common implementation methods include OFDM [7], DSSS [8] modulation technology and direct sequence spread spectrum technology [9]. The low signal-to-noise ratio of covert communication technology means that the probability of the enemy detecting the communication signal is very small [9]. Low signal-to-noise ratio covert communication technology greatly limits the signal transmission rate and transmission distance. At the same time, the performance of low signal-to-noise ratio communication technology in cooperative communication networks is much lower than that of point-to-point communication And is not suitable for underwater sensor networks. Bionic covert communication technology is to imitate the sounds inherent in the marine environment, including the sounds of marine mammals, the sounds of nature and human activities, or produce artificially similar sound signals similar to them as communication signals. These communication signals can be detected by the enemy, but in the signal processing process, the enemy treats these signals as marine environmental

Research on Underwater Bionic Covert Communication

225

noise and excludes it from the recognition process, so as to achieve the purpose of covert communication [6]. The biggest feature of concealed bionic communication technology is that it can ensure the safety of communication and the concealment of launch platforms, and is bio-friendly. 2.2 Research Status of Underwater Bionic Covert Communication In the early 21st century, the annual report of the US Naval Research Office first proposed the use of the sound of marine life or the sound of the ocean itself to conduct subtle underwater acoustic communication. Since then, researchers at home and abroad have proposed and implemented a variety of methods for concealed underwater acoustic communication based on bionic ideas. In 2008, Dol, H.S and Quesson, B.A.J and others used dolphins’ calls for underwater bionic communication for the first time and conducted underwater experiments, which verified the feasibility of underwater bionic communication for the first time [10]. Because the author uses multiple receivers to receive signals, but does not use channel equalization technology, the bit error rate is very high. A. EIMoslimany and others used signal modeling for the first time to construct FM signals to mimic the sounds of dolphins and whales for subtle underwater acoustic communication [11]. The experimenter first performs channel estimation through a matching tracking algorithm, then uses the maximum likelihood estimator to estimate the parameters of each received signal, and then decodes these parameters according to the mapping rules at the transmitter. In 2012, Professor Liu Songzuo of Harbin Engineering University successfully experimented for the first time a method of covert communication using dolphin click sound as a communication signal carrier [12]. In this method, the dolphin’s whistle sound is used as the synchronization signal, and the click sound is used as the information carrier to modulate the information on the time interval of each sound signal, thereby realizing covert communication. This method uses a matching tracking algorithm for channel estimation and a rake receiver for channel equalization [13]. In 2013, Liu and others proposed a new method of covert communication that mimics the high-frequency click sound of dolphins [14]. This method uses Rayleigh pulses that imitate the dolphin highfrequency click signal as the signal carrier. Each bit pulse is modulated by a time-hopping (TH) code, and the entire frame is modulated by pulse position modulation (PPM). In the same year, Liu and others also proposed a method of remote covert communication that mimics the sound of whales [15]. This method uses low-frequency, high-sound-level whale call signals as a covert carrier, hides the direct-sequence spread spectrum signal carrying information in the whale call signal range close to its frequency range, in order to achieve camouflage covert communication. Han Xiao studied the bionic communication method based on the dolphin whistle signal [16]. In this method, The confidentiality of the pattern delay difference coding is combined with the bionic effect of the dolphin whistle signal to increase the concealment effect of the communication. In addition, Jia Yichao and others from Nanjing University of Science and Technology also used the sound of sea lions to implement bionic underwater acoustic communication [17]. In this method, the sea lion call is used as the communication signal, and the bi-orthogonal modulation method is used to modulate the information on the sea lion call. In 2015, Liu proposed a bionic communication technology based on minimum-shift keying (MSK)

226

J. Shen et al.

modulation [18]. This method uses traditional MSK to modulate the information, and hides the modulated MSK signal in the spectral profile of the original dolphin whistle signal. In 2017, from the perspective of modeling, Liu and others used multiple chirp signals to imitate the real dolphin whistle to realize the subtle transmission of underwater information [19]. In 2017, Qiao Gang and his team designed a bionic portable modem for covert communication at short distances underwater [20]. The device stores different types of cetacean sound signals in the SD card of the modem for disguised communication effects in different scenarios. In 2018, Liu Zuozuo and others pioneered the selection of artificial noise such as marine piling noise as the overall signal carrier. Based on the characteristics that piling noise is arranged at approximately equal intervals, the secret information is modulated, and the synchronization signal is designed according to the time-hopping pulse position modulation method [21]. In 2018, Jiang Jiajia and others proposed a disguised sonar signal waveform design approach with its camouflage application strategy for underwater sensor platforms [22]. In 2019, Qiao Gang and others proposed a unique CUAC technology for simulating humpback whale songs [23]. Use Mary and PPM technology to modulate data in real humpback whale songs. In 2019, Muhammad Bilal and others proposed a new method of bionic Morse code that imitates humpback whale songs for underwater covert communication. Based on information entropy, this method compiles complex humpback whale songs into bionic Morse code, and develops standard imitation Morse code for English characters. In 2020, Jiang Jiajia and others designed a bio-inspired camouflage communication framework (BBICCF) based on the killer whale sound, which is used for safe underwater communication between military underwater platforms [24]. The research can choose the type of communication signal according to the actual application needs and it has practical significance for communication applications between underwater platforms.

3 Discussion In summary, as a new research direction, underwater bionic covert communication is still in the initial development stage, and there are still many unresolved problems. There are many types of ocean background sounds as information carriers, and it is very important to choose a suitable sound carrier. The sound of marine mammals is an ideal information carrier because of its proper frequency bandwidth and high sound source quality. Using the sound of marine mammals as an information carrier can control the power and frequency of the sounding unit very well, so it can reduce the impact of underwater wireless sensor networks on marine life to a certain extent, and also enhance the concealment of underwater equipment. Ensure the safety of the underwater acoustic communication network. However, the current research on marine organisms is not comprehensive enough. We are unable to determine the purpose of different vocal behaviors of marine organisms, and our understanding of the geographical distribution of marine organisms is also very limited. These issues are of great significance for the selection of information carriers. Transmission rate, bit error rate, and concealment effect are the key indicators of underwater concealed communication. How to improve the transmission rate and concealment effect while reducing the bit error rate is a key issue. In this regard, there is an

Research on Underwater Bionic Covert Communication

227

urgent need for more effective communication encoding and decoding methods. At the same time, the current evaluation of concealment effects lacks a unified index, and it is necessary to study and propose more complete standards to evaluate the disguise effect of concealed communications. The current covert underwater acoustic communication emphasizes the covertness of the signal level rather than the covertness of the information level. Future research can introduce encryption at the information level, establish a hierarchy of information hiding, and choose different encryption levels for different information, reduce the resource consumption of underwater wireless sensor networks, improve work efficiency, and further improve the safety of underwater networks safety.

4 Conclusion This paper introduces the development status of underwater bionic covert communication technology. After years of development, the underwater concealed communication technology has further matured, providing a good theoretical basis for the research of underwater communication equipment applications. Because of its unique low detection mechanism, underwater bionic covert communication can meet the needs of underwater wireless sensor networks for concealment, safety and transmission power, and has little impact on the ecological environment, which has the effect of improving the performance of underwater wireless sensor networks. Certain help. The current research in the field of underwater bionic covert communication has achieved some preliminary results, but there is still a lot of unresearched space that deserves our further research. Acknowledgment. This work was supported by the following projects: the National Natural Science Foundation of China (61862020); the key research and development project of Hainan Province (ZDYF2018006); Hainan University-Tianjin University Collaborative Innovation Foundation Project (HDTDU202005).

References 1. Akyildiz, I.F., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: research challenges. Ad Hoc Netw. 3(3), 257–279 (2005) 2. Partan, J., Kurose, J., Levine, B.N.: A survey of practical issues in underwater networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 11(4), 23–33 (2007) 3. Heidemann, J., Stojanovic, M., Zorzi, M.: Underwater sensor networks: applications, advances and challenges. Philos. Trans. R. Soc. A 2012(370), 158–175 (1958) 4. Chitre, M., Shahabudeen, S., Freitag, L., et al.: Recent advances in underwater acoustic communications & networking. In: OCEANS 2008. IEEE (2009) 5. Li, S., et al.: Mid- to high-frequency noise from high-speed boats and its potential impacts on humpback dolphins. J. Acoust. Soc. Am. 138(2), 942–952 (2015) 6. Gang, Q., Muhammad, B., Songzuo, L., et al.: Biologically inspired covert underwater acoustic communication—a review. Phys. Commun. (2018). S1874490717305608 7. Leus, G., Van Walree, P.: Multiband OFDM for covert acoustic communications. IEEE J. Sel. Areas Commun. 26(9), 1662–1673 (2008)

228

J. Shen et al.

8. Yang, T.C., Yang, W.-B.: Low signal-to-noise-ratio underwater acoustic communications using direct-sequence spread-spectrum signals. In: Oceans. IEEE (2007) 9. Yang, T.C., Yang, W.B.: Low probability of detection underwater acoustic communications using direct-sequence spread spectrum. J. Acoust. Soc. Am. 124(6), 3632–3647 (2008) 10. Dol, H.S., Quesson, B.A.J., Benders, F.P.A.: Covert underwater communication with marine mammal sounds. Covert Underwater Communication with Marine Mammal Sounds Tno Repository (2008) 11. Elmoslimany, A., Zhou, M., Duman, T.M.: An underwater acoustic communication scheme exploiting biological sounds. Wirel. Commun. Mob. Comput. 16, 2194–2211 (2016) 12. Liu, S., Qiao, G., Yin, Y.: A bionic underwater acoustic communication method using dolphin calls. Acta Phys. Sin. 14, 291–298 (2013) 13. Liu, S., Qiao, G., Ismail, A.: Covert underwater acoustic communication using dolphin sounds. J. Acoust. Soc. Am. 133(4), EL300 (2013) 14. Liu, S., Qiao, G., Zhang, L.: Biologically inspired covert underwater acoustic communication using high frequency dolphin clicks. In: OCEANS 2013 IEEE Conference, San Diego, vol. 58, no. 2, pp. 1–5 (2013) 15. Liu, S., Qiao, G., Ismail, A., et al.: Covert underwater acoustic communication using whale noise masking on DSSS signal. In: 2013 OCEANS – Bergen. MTS/IEEE. IEEE (2013) 16. Xiao, H., Jingwei, Y., Longxiang, G., et al.: Research on bionic underwater acoustic communication technology based on differential Pattern time delay shift coding and dolphin whistles. Acta Phys. Sin. 62(22), 224301 17. Jia, Y., Liu, G., Zhang, L.: Bionic camouflage underwater acoustic communication based on sea lion sounds. In: International Conference on Control. IEEE (2015) 18. Liu, S., Ma, T., Qiao, G.: Bionic communication by dolphin whistle with continuous-phase based on MSK modulation. In: IEEE International Conference on Signal Processing. IEEE (2016) 19. Liu, S., Ma, T., Qiao, G., et al.: Biologically inspired covert underwater acoustic communication by mimicking dolphin whistles. Appl. Acoust. 120, 120–128 (2017) 20. Qiao, G., Zhao, Y., Liu, S., Bilal, M.: Dolphin sounds-inspired covert underwater acoustic communication and micro-modem. Sensors 17(11), 2447 (2017) 21. Liu, S., Wang, M., Ma, T., et al.: Covert underwater communication by camouflaging sea piling sounds. Appl. Acoust. 142(DEC.), 29–35 (2018) 22. Jiang, J., Sun, Z., Duan, F., et al.: Disguised bionic sonar signal waveform design with its possible camouflage application strategy for underwater sensor platforms. IEEE Sens. J. 18, 8436–8449 (2018) 23. Bilal, M., Gang, Q., Liu, S.: Covert mimicry communication using humpback whale song. In: IBCAST 2019 (2019) 24. Jiajia, J., Xianquan, W., et al.: A basic bio-inspired camouflage communication frame design and applications for secure underwater communication among military underwater platforms. IEEE Access 8, 24927–24940 (2020)

Authentication and Access Control for Data Usage in IoT

The Application of Virtual Reality Technology in Architectural Design Lili Peng(B) , Yihui Du, and Zijing Zhang Chongqing College of Architecture and Technology, Chongqing, China [email protected]

Abstract. Under the background of the rapid development of information technology and Internet globalization, the buildings and cities that people depend on have undergone earth-shaking changes, and architectural design tools and design models are constantly updated. Architecture is unique. The method continues to expand its development space. Construction engineering is a complex and largescale dynamic system, which involves not only many but also more complicated links. Because there are complex structures inside general buildings. This article focuses on the application of virtual reality technology in architectural engineering design from the basic concepts and characteristics of virtual reality. Keywords: Virtual technology · Virtual reality · Architecture · Design

1 Introduction In today’s big social background, with the changes of the times and the rapid development of science and technology, China’s construction level has been continuously improved, the design plan has a stronger implementation feasibility, and the design concept of the building is therefore more diverse. At the same time, with the development of my country’s economy and society, consumers’ aesthetic concepts have undergone great changes, and architectural design styles and design concepts have also undergone great changes. Due to the acceleration of the pace of life, people’s requirements for architectural design have changed from light luxury to simplicity. People have begun to pursue the beauty of simplicity and the inner beauty of things. Therefore, the transformation of architects’ design style is to keep up with the pace of the times. It is also the embodiment of social aesthetics. This change actually reduces the difficulty of building construction, but on the other hand, it also imposes new requirements on architectural design. How to create a unique charm of architecture in a simple design style and lead the sustainable development of the industry. This will be an important subject of architectural design work [1].

2 Overview Virtual Reality Technology VR (Virtual reality) was put forward by Jaron Lanier, an American entrepreneur. It means the integrated utilization of computer graphics system, multimedia technology, sensor © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 231–236, 2021. https://doi.org/10.1007/978-3-030-62746-1_34

232

L. Peng et al.

technology, three-dimensional simulation technology and various devices to display and control interfaces; the computer can generate the interactive three-dimensional environment, which offers immersive techniques [2]. The core essence of VR is to visualize computer data, so as to achieve the interaction of information between human subjects and virtual digital objects [2]. The virtual environment system includes following disciplines and technologies: computer graphics, image processing, pattern recognition, voice processing, Internet techniques and so on. The generated data is processed and high-performance computing, and it is a new type of highly comprehensive high-tech information technology to model a large-scale integrated environment composed of sub-systems of considerable scale with different functions and levels [3]. Figure 1 is the embodiment of VR technology in architectural design.

Fig. 1. The embodiment of VR technology in architectural design

3 Characteristics of VR Technology 3.1 Immersion VR technology is based on the physiological and psychological characteristics of human vision, hearing, and touch. The computer generates real visual three-dimensional images. The user wears interactive equipment such as helmet-mounted displays and data gloves, and even puts himself in a virtual environment In, become a member of the virtual environment. The interaction between the experiencer in the virtual world and various objects or scenes in the virtual environment will produce mutual influence, just like the interaction between humans and nature in the real world, all feelings are so realistic [4]. It’s even a real, immersive experience. 3.2 Interactivity Human-computer interaction in a VR system is that people use devices such as keyboards, mice, analog monitors, touch screens, etc. to enter the computer system. The computer

The Application of Virtual Reality Technology in Architectural Design

233

system uses high-speed calculations and analysis to make a kind of human-like behavior, which is the initial embodiment of artificial intelligence.. Experiencers can inspect, manipulate, research, and calculate objects in the virtual environment through their own language, body language, or touch the keyboard, interface and other natural actions, and they can also generate big data records and archives [5]. 3.3 Multi-sensitivity The VR system is equipped with supporting devices for visual, audio, tactile and kinesthetic sensing and reaction, so that the experiencer can experience the realm of “ears and hearing is true, seeing is believing” in the virtual environment, and gain vision senses, hearing, touch, kinesthetics, etc., make the experiencer unable to distinguish between virtual and reality [6].

4 Application of VR Technology in Architectural Design For architectural design, the charm of VR in the eyes of architects is not only to truly reflect the beauty of the building and the three-dimensional performance of humancomputer interaction, but also to provide new information that other traditional expression methods cannot match [7]. Communication and editing interface: while experiencing the three-dimensional space in person, through real-time editing of architectural elements, real-time adjustment of three-dimensional scenes, system information integration and other technologies, it provides a powerful way for design comparison and design thinking, design features and related information display, highlighted in the following aspects: 4.1 Scientific and Accurate Analysis of Design Information VR’s powerful application program interface can import relevant complex system models for analysis, so it can provide architects with a global and objective understanding. It provides advanced optical systems, atmospheric analysis systems, geographic information systems (GIS), etc., which can make creative information analysis more scientific, real, and accurate [8]. 4.2 VR Realizes Dynamic Spatial Design VR technology can bring architects’ abstract thinking performance closer to reality, free architects from the constraints of two-dimensional performance and the uncertainty of abstract thinking, and enable their ideas to be fully developed in the real-time generated three-dimensional world [8]. The conception of the created architectural space can be sculpturally free. We can think that the development of technology restricts the form, the requirements of environment and function affect the form, and the tools and media of design expression may also promote the emergence of new architectural forms, such as Fig. 2.

234

L. Peng et al.

Fig. 2. VR realizes dynamic spatial design

4.3 VR Implements the Whole-Process Auxiliary Design The application of the VR system in architectural design can run through the entire process, from the feasibility study at the initial stage, site condition analysis, to conceptual design, spatial shape combination at the development stage, architectural details, integration with the environment… until the technology at the construction stage Both simulation and VR systems can play their role [9]. 4.4 VR Realizes Information System Design In the design, through the “data interconnection” environment, the building model in the VR system is interconnected with other digital media information such as text, sound, screen, plan, three-dimensional model and 3D animation, so that a specific screen in VR can be Contains key information, such as: plan view, section view, related structure description, design content worthy of further scrutiny [10]. 4.5 VR Realizes the Presence of Architectural Expression The immersive nature of VR technology allows architects to be on the scene. Through the flight mode, they can take a bird’s-eye view of the building and observe the relationship between the building and the surrounding environment; observe and experience the layout of the building space and landscape design through a full-scale perspective. Realtime roaming inside and outside the building can help you observe the details at close range, experience the building space, the appearance of the building, the size of the building components, the reinforcement of the components, etc., and you can even wear data gloves to touch the materials on the building surface, so that the architect can design [11]. The buildings will be more rational, scientific and beautiful.

The Application of Virtual Reality Technology in Architectural Design

235

4.6 Interactive Application of VR in Architectural Experience VR technology realizes the interaction of architects with virtual environment objects through the use of virtual interactive interface equipment, and the space of the place is expressed as much as possible [7]. In VR, the viewing angle can be determined from the overall situation or from the details; the architectural elements can be edited; at important nodes, relevant data can be linked as needed to obtain more information, giving the architect more autonomy [11]. 4.7 VR Realizes Creativity in Perception Activities The VR system can provide architects with a free multi-angle and multi-dimensional human-computer interaction experience program. People can choose to observe the building carefully in a static state, or dynamically experience the architectural space in a variety of motions. At the same time, they can compare different plans in real time, compare multiple plans, and make judgments and choices. At the same time, the system can also simulate sunlight, related equipment and facilities, etc., making the overall expression of the building more comprehensive, more real, more scientific and more convincing [12], as shown in Fig. 3.

Fig. 3. VR in architectural design to view design effects from multiple angles

5 Conclusion VR technology saves time and resources for the construction process by simulating and restoring the construction site, and at the same time adds a guarantee to the design of its buildings. Modern civil architecture design urgently needs the support of science and technology, and the emergence of VR technology is a booster for its rapid development using scientific and technological means. It is also an inevitable process of architectural design digitalization. The accuracy and scientificity of virtual technology will be the foundation of architectural design digitalization.

236

L. Peng et al.

References 1. Zhao, N.: Research on the application of virtual simulation technology in architectural design. Changsha Univ. Sci. Technol. 5, 23–26 (2019). (in Chinese) 2. Li, S.: Research on the application of virtual reality technology in architecture and urban planning. Changsha Univ. Sci. Technol. 12(03), 112–115 (2018). (in Chinese) 3. Zhang, L.: Research on the application of virtual reality technology in architectural heritage protection. Jiangnan Univ. 11(03), 34–37 (2019). (in Chinese) 4. Chen, Z., Li, X., Yan, W.: Application of virtual reality technology in the field of architecture. Eng. Constr. Des. 8, 88–90 (2015). (in Chinese) 5. Wang, D., Zhang, J.: Building structure design based on virtual reality technology. Struct. Eng. 11(5), 61–63 (2014). (in Chinese) 6. Zhu, X., Peng, S.: Application of virtual reality technology for construction safety. Anhui Sci. Technol. 3(11), 44–46 (2014). (in Chinese) 7. Yang, Q., Lin, D.: Application and promotion strategy of VR technology in architectural design. Constr. Technol. 4(08), 733–735 (2016). (in Chinese) 8. Bai, S., Zhang, Y.: Application value analysis of VR technology in prefabricated buildings. Constr. Econ. 6(11), 106–109 (2015). (in Chinese) 9. Yuan, S., Wei, J., Zhai, M.: Building construction curriculum reform based on BIM virtual reality. J. Hunan Ind. Vocat. Tech. Coll. 6(4), 97–99 (2017). (in Chinese) 10. Liu, J.: Talk about the application of VR technology in construction engineering. Archit. Eng. Technol. Des. 6(08), 251–253 (2016). (in Chinese) 11. Gu, Z.: Analysis of application practice based on virtual construction technology. Constr. Eng. Technol. Des. 2(08), 130–132 (2015). (in Chinese) 12. Liu, X., Wu, F.: The innovative application of BIM-based virtual reality technology (VR) in construction engineering. Chin. Foreign Archit. 4, 134–136 (2018). (in Chinese)

Computer-Assisted Teaching and Cultivate Students’ Innovative Thinking Ability Feng Gao(B) South China Business College, Guangdong University of Foreign Studies, Guangzhou, China [email protected]

Abstract. With the rapid development of computer-assisted teaching technology, it can not only improve the efficiency of classroom teaching and enhance the interaction between teachers and students, but also effectively activate the classroom atmosphere and increase students’ interest in learning. As an important development direction of computer technology in the future, the application prospect in classroom teaching is very broad. By enabling knowledge to be presented in front of students more three-dimensionally, creating a more realistic classroom teaching atmosphere for students, achieving visual and auditory dual stimulation, so that students’ learning initiative and learning effects are comprehensively enhanced. This article analyzes the application in computer-assisted teaching, and then discusses computer-assisted teaching and cultivating students’ innovative thinking ability. Keywords: Computer · Assisted teaching · Students · Innovative thinking

1 Introduction Combining computer technology, information technology, etc., using computer simulation to create a three-dimensional space, providing users with sensory simulations of vision, hearing, touch, etc., so that users can have an immersive feeling. Virtual reality does not have time and space limitations, but transmits accurate 3D world images to users as users continue to move and explore. Through the application in classroom teaching, the content of the teaching can be displayed to students more realistically and vividly, allowing students to feel immersive, improving students’ visual and auditory stimulation, and enabling students to be more engaged in teaching in the event [1].

2 The Application of Computer-Assisted Teaching Computer-assisted teaching is a teaching method that assists students and teachers to complete discussion, lecture, review and other teaching links in the education process through computers. Its essence is to disseminate teaching information to students with more abundant means and efficiently [2], as shown in Fig. 1. In terms of its extension, © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 237–242, 2021. https://doi.org/10.1007/978-3-030-62746-1_35

238

F. Gao

computer-assisted teaching includes five modes. One is the application in student practice. It mainly refers to students completing various tasks assigned by the teacher through a computer system. The computer system provides students with the best results through intelligent analysis. The method of disintegration, and give reasonable supplementary exercises for each student’s own weaknesses, and on this basis, provide each teacher with a learning plan for each student’s characteristics in future teaching [3].

Teacher Students

Fig. 1. Computer-aided teaching model

2.1 Computer-Aided Guidance to Students In the traditional way of education, due to time and energy constraints, the guidance time for each teacher to students is always limited. Due to the different level of understanding of the knowledge taught by the teacher, each student has different problems with the content taught by the teacher, and the teacher cannot be comprehensive [4]. However, through computer-assisted teaching, the computer itself can give different guidance according to each student’s weakness, which largely compensates for the teacher’s inconsistent teaching due to time and energy constraints. 2.2 The Application of Computer-Assisted Communication Between Students Teaching is not only a rigid answering and solving process, but also a process of forming a healthy personality for students through the education of emotion, will and reason. The answer to the exercises seems to be a rigid training process, but it also includes the life process of students asking questions, overcoming difficulties, and solving problems. In this process, students will inevitably have various emotional fears [3]. Computers can communicate well with students through artificial intelligence, and in this process, promote students to form a good attitude towards life and correct study habits. 2.3 Computer-Assisted Application in Teacher Teaching In computer-assisted teaching, teachers can use computer-designed games to allow students to actively accept various knowledge points that the textbook wants to convey in

Computer-Assisted Teaching and Cultivate Students’ Innovative Thinking

239

the fun learning. At the same time, various complex formulas in physics, chemistry and mathematics can also be simulated by computer in the form of images and sounds, so that students can understand the inner meaning of these formulas more vividly, and they can more directly understand the meaning of these formulas [3]. 2.4 Computer-Assisted Teaching Is Used in Problem Solving Process Traditional teaching methods often only pay attention to the importance of answering questions. As long as one answering method can get the correct answer, even if this answering method is boring, it is good. However, through computer-assisted teaching, you can show the pros and cons of multiple solving methods, so that students can choose the most suitable method for solving problems during the learning process [5].

3 Advantages of Computer-Assisted Teaching The essence of computer-assisted teaching is to disseminate teaching information to students efficiently with richer means. From this point of view, computer-assisted teaching has the following three advantages (shown in Fig. 2):

Computer-assisted teachin

Rich teaching information

Information dissemination efficiency

Stimulate learning

Fig. 2. The advantages of computer-assisted teaching

3.1 The Richness of Educational Information Dissemination Traditional education’s information dissemination method is often based on blackboard writing and exercises. This information dissemination method is mainly a way of disseminating abstract information from concept to concept. In this teaching method, teachers mainly focus on the explanation of concepts, and the dissemination of knowledge is often realized through enumeration and noun interpretation. In this teaching method, it is often difficult for students to understand what some difficult concepts are saying. Because this method of knowledge dissemination wants students to realize the most essential connotation of knowledge at the beginning of teaching. However, the process

240

F. Gao

of human cognition is a process that slowly deepens from the surface [5]. Contrary to traditional teaching methods, computer-assisted teaching uses pictures, animations, videos, and sounds to allow students to understand knowledge from appearances, so that students can obtain all the graphical expressions of knowledge from the beginning [6]. 3.2 The Efficiency of Educational Information Dissemination Due to the limitation of the teacher’s time, energy and educational resources, traditional education methods often fail to enable every student to effectively understand the meaning of knowledge itself [6]. However, through computer-assisted teaching, the system can automatically identify the difficulties and perplexities of each student in the education process. And give the most effective solution to these difficulties and puzzles. In this way, the efficiency of education and teaching is greatly improved. 3.3 Computer-Assisted Teaching Can Stimulate Students’ Enthusiasm for Learning The traditional teaching method is boring because it is from concept to concept. Computer-assisted teaching includes pictures, sounds, animations and other information dissemination methods, and provides different learning plans for each student. The concealed teaching methods are undoubtedly more targeted and more interesting, that make students better enter the classroom [7].

4 Computer-Assisted Teaching Trains Students’ Innovative Thinking The construction of a computer-assisted teaching training student innovation system should establish a computer-assisted teaching quality evaluation mechanism, a computerassisted teaching quality monitoring mechanism, and a computer-assisted teaching quality incentive mechanism. 4.1 Establish a Computer-Assisted Teaching Quality Evaluation Mechanism An effective way of quality management through quantitative methods. The establishment of a computer-assisted teaching quality evaluation mechanism must first establish an evaluation index system, secondly, clarify the evaluation object and the evaluation subject, and collect the original data according to the specific situation of the evaluation object, and finally according to the quantification [8]. The evaluation model calculates the specific evaluation value of each evaluation object, thereby laying the foundation for establishing an incentive system based on the quality evaluation results [8].

Computer-Assisted Teaching and Cultivate Students’ Innovative Thinking

241

4.2 Establish a Computer-Aided Teaching Quality Monitoring Mechanism A computer-assisted teaching quality and evaluation office should be established to uniformly track, evaluate and manage discipline construction and training quality. At the same time, a computer-assisted teaching supervision system was established to supervise and guide the education work of the unit. The members of the supervision team are composed of computer-assisted teaching teachers, who should be selected from among experienced and retired teachers with senior professional titles [9]. The main work of the supervision team is to integrate point-to-point and aspect-to-point, and to achieve the quality of computer-assisted teaching from the perspective of the entire life cycle of education Monitoring work. 4.3 Establish a Computer-Aided Teaching Quality Incentive Mechanism Funding protection is the key to talent training. For example, Shenzhen Huawei Technology Company clearly stipulates in the “Huawei Basic Law” that the company shall use 4% of its total sales revenue for young teacher training expenses; P&G (China) shall recruit every year a large part of the new young teachers in China are sent to the United States to train and exercise for one year, and the company will bear all the expenses [9]. Therefore, in promoting the cultivation of talents in computer-assisted education, it is necessary to actively establish a talent training funding guarantee mechanism, form a capital investment system in which government finances and social entities participate together, and establish a teacher incentive mechanism based on the results of quality evaluation [10]. 4.4 Establish an Intercommunication System for Computer-Assisted Education Institutions The academic education level of computer-assisted education should be actively expanded to the postgraduate education level on the basis of junior college, undergraduate and other academic education levels, so as to meet the needs of modern computer-aided education objects for academic education on the basis of knowledge and skills education, and Realize advanced computer-assisted education [7]. Therefore, it is necessary to establish an intercommunication system between computer-assisted education institutions and ordinary universities, such as promoting the accumulation and conversion of learning achievements in ordinary universities, and initiating the certification of learning achievements and the accumulation of credits, so as to establish the advanced and long-term academic education based on computer-assisted education [10].

5 Conclusion Computer technology is a rapidly developing subject. It is the requirement of the times to lay the necessary foundation for adapting to the study, work and life of the information society. It is also an indispensable ability for students to develop themselves. In the practice of computer-assisted teaching, teachers should create opportunities for students

242

F. Gao

to actively explore, encourage and inspire students to think actively, be good at thinking, learn to think independently, and highlight the cultivation of innovative thinking. At the same time, teaching should emphasize the improvement of innovation ability, give full play to independent initiative, give full play to students’ learning potential, and gradually improve practical ability and innovative spirit. Acknowledgments. Project Fund: This paper is the outcome of the study, On the Construction of a Cooperative Teaching Mode for Teachers from Multiple Disciplines Based on the Development of Students’ Innovative Thinking, which is supported by the Foundation for Provincial-level Projects of Young Innovative Talents in Colleges and Universities of Guangdong Province. The project number is 2019 WQNCW165.

References 1. Yi, L.: The concept and practice of computer-assisted teaching. China Contin. Med. Educ. 4, 84–86 (2017). (in Chinese) 2. Baojiao, L.: A new idea of computer-assisted teaching in school classrooms. Educ. Teach. Forum 2(03), 55–57 (2019). (in Chinese) 3. Ning, Z., Yingfang, F.: Application research of digital virtual technology in clinical teaching of hepatobiliary surgery. China Contin. Med. Educ. 10(33), 16–19 (2018). (in Chinese) 4. Hao, C., Meiping, L.: Talking about the application of VR in the teaching of “Architectural Construction”. Jiangxi Build. Mater. 6(13), 54–55 (2018). (in Chinese) 5. Zhao Xi, H., Wenhua, Z.X.: Development and practical application of a certain radar virtual maintenance training system. Educ. Teach. Forum 8(49), 76–78 (2018). (in Chinese) 6. Hang, Z., Canheng, Z.: Research on teaching experimental methods of civil aviation security inspection technology courses based on VR technology. Educ. Teach. Forum 12(49), 273–274 (2018). (in Chinese) 7. Quan, S., Zhou, Yu.: Curriculum experimental teaching of combination of virtuality and reality and its application in civil aviation talent training. Educ. Teach. Forum 7(9), 175–178 (2019). (in Chinese) 8. Hongxia, Z.: Some thoughts on the practice of computer multimedia assisted teaching in colleges and universities. Inf. Comput. Theory Ed. 11(14), 255–256 (2018). (in Chinese) 9. Shuhui, L.: Computer-assisted teaching in colleges and universities. Sci. Technol. Econ. Trib. 22, 181–184 (2017). (in Chinese) 10. Tingting, C., Zhengmao, L.: Exploration and research on teaching methods of computer basic multimedia courses. Shandong Ind. Technol. 3(20), 184–187 (2019). (in Chinese)

The Reform Progress and Practical Difficulties of State-Owned Hospitals Under Information Age—Case Analysis Based on the Reform in a Medical Institution of a Group in China Yilong Wang1,2 , Hongjie Bao2(B) , Xuemei Zhang3 , and Aihong He4 1 School of Public Administration, Sichuan University, Chengdu 610041, China

[email protected] 2 School of Management, Northwest Minzu University, Lanzhou 730030, China

[email protected] 3 The Second Affiliated Hospital of Suzhou University, Suzhou, China 4 School of Economics, Northwest Minzu University, Lanzhou 730030, China

Abstract. The reform of state-own hospital under information age is approaching. All state-owned hospitals will be separated from their parent system through reorganization, restructuring, transferring and centralized management under information age, but there are numerous practical difficulties in this reform under information age. This paper followed up the whole reform process in a medical institution of A Group, summarized practical difficulties in the reform and provided preliminary suggestions for reasonable development of the reform. Practical difficulties in the reform of state-owned hospitals include unclear ownership, backlash among employees and compensation dispute under information age. Integrating internal resources, seizing market opportunities, seeking differentiate development, filling the gap in technology, keeping pace with medical reform and playing a positive role in transformation are reasonable approaches that can improve the reform of state-owned hospitals and provide referential significance for the reform of health system in China under information age. Keywords: Stated-Owned hospital · Reform · Difficulty · Hierarchical medical system · Information age

1 Introduction to the Reform of State-Owned Hospital 1.1 Enterprise Hospital Enterprise hospital refers to all kinds of hospital established by different industries and other departments [1]. As the product of planned economy, it bears a unique mark of the time, and a typical example is the stated-owned hospital. Enterprise health resources, which is an important part of health resources in our country, exerts positive impacts on covering the shortage of local health resources, boosting productivity and improving © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 243–250, 2021. https://doi.org/10.1007/978-3-030-62746-1_36

244

Y. Wang et al.

people’s health, especially the health of employees and their family members. However, common problems in most of the enterprise hospitals are that there are too many small-sized enterprise hospitals scattering in different places; the medical equipment is outdated; businesses are decreasing; resource efficiency is low and brain drain is severe [2]. In 2015, there are 985,181 health institutions and 26,314 hospitals in China, of which 3,100 hospitals are enterprise hospitals, accounting for 12% of the total hospitals [3]. Affected by advancement of reform of state-owned enterprise, separating administrative functions from business operation and solving historical problems attract attentions from the governments [4, 5]. 1.2 Difficulties in Development With the further implementation of new medical reform policy, enterprise hospitals are facing such problems as unsatisfactory compensation system, exclusion from health region planning, no allowance for community health service institution and unfair social security insurance. In particular, hierarchical medical service, cancellation of medicine markups and reform of payment in medical insurance greatly affect the development of enterprise hospitals. As different places are implementing the reform of hierarchical medical system and establishing medical partnerships, enterprise hospitals are being further marginalized. Besides, after canceling medicine markups, enterprise hospitals cannot make up its losses through increasing fees in diagnosis, treatment, surgery and medical care like public hospitals because of their limited technology, costs in examination, test and medicine account for a large proportion [6]. Under such circumstance, most hospitals have to adjust their performance distribution system; medical techniques become worsen; the number of nursing staff are decreasing. Therefore, it is necessary to put into practice the reform. 1.3 History of the Reform With the gradual establishment and development of socialist market economy, the favorable environment for state-owned enterprise to establish hospital is disappearing, so it will be an irresistible trend to separate hospitals from the enterprises [7]. From 1990s, there were three large-scale reform and restructuring in enterprise hospitals. In 1995, government introduced a new policy to free enterprises from performing social functions, that means enterprise hospitals would be separated from their “parents” (the enterprises). The reform of separating the main businesses from auxiliary services were carried out in 100 state-owned hospitals in 18 pilot cities. The goal of this reform was to alleviate burdens on enterprise hospitals, but owning to increasingly large fiscal investment in medical health, better overall operation performance of state-owned enterprises and failure of reform in some enterprise hospitals, a large number of enterprise hospitals strongly insisted on staying in the system to clarify their public hospital identity, resulting to unsatisfactory effect in the reform [8]. In 2002, the state government published an announcement requiring hospitals established by medium- and large-scale enterprises to separate from the enterprises within 2–5 years. In this reform, three were about 1,800 local enterprise hospitals and 200 central enterprise hospitals separating from enterprises and became local self-supporting public institutions. In 2015, separating state-owned

The Reform Progress and Practical Difficulties of State-Owned Hospitals

245

enterprises from medical services re-aroused public attention, and as medical health industry were set as strategic core industry, various investors attempted to seize the investment opportunities in the market of enterprise hospital reform. In March 2018, governmental announcement requested that offering allowance or subsidy to medical institutions set up by independent large-scale industrial and mining enterprises is not allowed, so separating hospital from parent enterprises is the only choice. 1.4 Reform Mode In August 2017, Guiding Opinions on Deepening the Reform of Education and Medical Institutions Run by State-owned Enterprises published by State-owned Assets Supervision and Administration Commission (SASAC), State Commission Office for Public Sector Reform and other four commissions proposed 4 reform modes for the reform of medical institutions established by enterprises: handing over to local government, closing down, integrating resources and reorganizing. (1) Encouraging handing over to local governments The central government encourage enterprises to reach agreement with the local governments. And local government are encouraged to take over management of nonprofit medical institutions established by the enterprises and provide management service according to regulations of governmental medical institutions. If medical institutions established by the enterprises are not taken over by local governments, they can decide to close down or adopt other reform modes on their own. (2) Orderly implementation of closing down For those medical institutions that have difficulties in operation and no competitive edge, it is allowed to close them down and employees’ re-employment should be properly arranged. (3) Actively integrate resources Support will be given to the operation of state-own enterprises focusing on health industry with government capital. Resource integration in medical institutions established by state-owed enterprises will be carried out through asset transfer, free transfer and trusteeship to realize specialized operation and centralize management, update and innovate medical health service and boost the development of heath care, healthy tourism and other industries. (4) Promoting restructuring with aligned standards Specialized and powerful social capital should be introduced; restructuring reform for medical institutions established by state-owned enterprises should be taken orderly according to marketization principle; priority should be given to non-profit medical institutions in the reform. After the reorganization of enterprise operated medical institutions, it is supposed that state-owned enterprises that do not focus on health industry will not take part in reorganization, and enterprises intend to join the reorganization do not have reorganization responsibilities any more.

246

Y. Wang et al.

In the four reform modes, handing over to local government are favored by many hospitals established by state-owned enterprises, but as it is restricted by regional health resources planning, most local governments are unwilling to take over them. Therefore, infusing social capital is the most common practice in hospital restructuring. Starting from 2016, substantial acquisition of state-owned hospitals and reorganization of hospitals have never stopped. Most of the hospitals decided to transform into profit-making social medical institutions through resource integration or reorganization. As there are more detailed rules and regulations on centralized and specialized management being published, overall allocation will become the main reform mode.

2 Reform of Medical Institution of a Group 2.1 General Introduction As an enterprise under SASAC, A Group has 24 medical institutions and 4,000 beds, and achieved an annual income of over RMB3 billion. In its 24 medical institutions, there are 17 hospitals and 7 clinics; 2 tertiary general hospitals, 9 level II general hospitals, 6 level I general hospitals and 7 no-grade medical institutions; 8 hospitals having independent legal entity and 16 having no independent legal entity. Among 24 institutions, there are 5 large-scale hospitals and they are public institutions. In 2015, A Group set up hospital management center to have centralized management on the 5 hospitals and take charge of the reform for medical institution reform under A Group. 2.2 Overveiw of the Reform Hospital management center under A Group established committee of experts to conduct field investigation on medial business, hospital management, medical device and financial management in all hospitals under A Group. After several rounds of investigation, analysis and discussion, 9 medical institutions were adopted in the management system of the center while other 10 institutions were rejected (5 institutions were adopted in the management system of the center in 2015). Hospitals admitted to the center adopted different approaches in their admission based on different situations and natures, and different hospitals had different positioning and plans according to their current development, peripheral medical market resources and local medical health planning. For hospitals that did not get the admission to the center, they were advised to close down as they have such common problems as shortage in talents, old medical equipment or even no medical device and functions being replaced by community health center. 2.3 Reform Pattern 2.3.1 Gratuitous Transfer of Asset Between Enterprises All budgeted staff will be accepted, asset will be gratuitously transferred as a whole, inheritance of medical qualification will be revised, and overall transfer of organizational system will be adopted in some medical institutions.

The Reform Progress and Practical Difficulties of State-Owned Hospitals

247

2.3.2 Gratuitous Transfer of Equity Between Enterprises For hospitals that have changed to private non-enterprise hospitals (legal entity), originally affiliated enterprises should be responsible for their second restructure, and gratuitously transfer to hospital management centre after reorganizing to wholly owned subsidiary of the originally affiliated enterprises. 2.3.3 Regrading Medical Institutions Which Have Budgeted Employees But No Independent Legal Entity Under Public Institutions (1) Gratuitous transfer of asset between public institutions: if A Group’s public institutional hospitals has extensive management ability to accept medical intuitions around them, assets employed (including land and building) will be gratuitously transferred by originally affiliated enterprises; assets will be included in or centralized management will be carried out by another hospital near the original hospital; succession strategies will be developed for new hospital areas or hospital qualification will be created; employee status will be kept in the original hospitals. (2) Gratuitous transfer of asset between public substitution and enterprise: if A Group’s public institutional hospitals has no extensive management ability to accept medical intuitions around them, separation of staff and asset in public institutions will be adopted; overall restructure will be taken after separation. For those hospitals that cannot be restructured, originally affiliated enterprises will gratuitously transferred the assets to local hospital management company established by hospital management center and budgeted employees will be arranged with the policy that employees retired before the policy published will be granted basic pension according to the original regulations. 2.4 Practical Difficulties 2.4.1 Issues of Property Rights Parent enterprises are closely linked with hospitals with unclear asset rights and liabilities in land and building, so transfer can be achieved only after further division. 2.4.2 Remaining Problems In the first reorganization of some hospitals, they were changed to private non-public enterprises with capital from natural person, but the share capital repurchase and evaluation of the investors remains unsolved. Before transfer, these institutions must withdraw private non-public legal entity, reorganize the system, rearrange employees and solve the long-term housing allocation. 2.4.3 Multiple Interests The reform of enterprise hospitals involves the interests of parent enterprise, local government, health department, employee, hospital, creditor and debtor in employee allocation, debt treatment, treatment for state-owned land, equity ratio and design of management

248

Y. Wang et al.

structure in the hospital. As it is difficult to keep a good balance for the requirements from different parities, it leads to the bottleneck in the relationship between different parties and no progress in the reform. 2.4.4 Financial Problems Hospitals and their affiliated enterprises have close service relationships and other medical institutions often get financial supports from hospitals through connected transactions, so there are problems in creditor’s right and debt in historical connected transactions. In particular, medical service charges in the statements of some hospital remains unsettled. 2.4.5 Compensation Most of the medical intuitions of A Group have outdated facilities and equipment, and maintain their operation hardly with support from the enterprises. After transfer, parent enterprise will not provide financial support to the hospitals. As an enterprise, the final goal of the hospital management center is to earn profit. At the beginning of the transfer, there are huge risks in making large investment, thus it takes a long time to negotiate the compensation. 2.4.6 Problems in Operation Most of the hospitals have such common problems as unsatisfactory operation, inefficient profitability and short-term solvency, low income from main business, high medical cost, shortage of investment, high employee turnover rate, huge differences between enterprise hospital and public hospital and low medical insurance for enterprise hospitals, leading to the increase in accounts receivable in the hospital’s financial account.

3 Reasonable Pathway for the Reform of State-Owned Hospitals 3.1 Integrate Internal Resource and Seize Market Opportunities As our country has published policy to make great effort to boost the development of medical health industry, state-owned enterprises followed the guidance of “group operation, specialized management” while taking into account their own development, implement centralized management in the hospital and accept all medical institutions into hospital management center. By doing so, it can not only boost the development of the enterprises, but also avoid uncertainties brought by transferring or selling asset to local hospitals, which is of benefit for overall development of medical market in our country. 3.2 Seek Differential Development, and Fill the Gaps in Technology Future development plan for medical institutions should be formulated in advance; dislocation competition with large-scale hospitals should be realized on the basis of combining

The Reform Progress and Practical Difficulties of State-Owned Hospitals

249

unique characteristics with local requirements; great effort should be put into fields that large-scale hospitals have not gotten involved. Moreover, hospitals are encouraged to applied for hospital for special diseases or nationwide diagnosis and treatment center to expand their influences throughout China. Hospitals should also invest more capital in technology researches and bring their strengths into full play to become a specialized hospital. 3.3 Keep Pace with Medical Reform, Take Actions to Realize Transformation Despite of the fact that enterprise hospitals confront enormous challenges under the background of new medical reform, they can also seize the opportunities of this reform to achieve transformation. For instance, as it is required in the medical reform that scale of public medical insinuation should be taken under control and wanton expansion is not allowed, after transferring to the local government, state-owned hospitals are encouraged to cooperate with public hospital to establish branch hospital, specialist sanatorium, elderly care institution and other medical institutions that are in urgent need. Acknowledgements. 1) This work was supported by the Fundamental Research Funds for the Central Universities of Northwest Minzu University (Grant No. 31920180101); 2) This work was supported by the Fundamental Research Funds for the Central Universities of Northwest of Northwest Minzu University (Grant No. 31920190117); 3) This work was supported by the Fundamental Research Funds for the Central University of Northwest of Northwest Minzu University (Grant No. 31920190032); 4) This work was supported by National Social Science Fund Youth Project (Grant No. 19CGL061). 5) This work was supported by National Social Science Project (Grant No. 19BSH068) 6) This work was supported by The Ministry of Education of Humanities and Social Science Fund Youth Project in 2020 Year (Project Name: Research on the poverty reduction effectiveness of farmer cooperative economic organization in the Northwest Minority Areas from the Perspective of Rural Revitalization Strategy) (NO. 20YJC850001).

References 1. Abdel-Basset, M., Elhoseny, M., Gamal, A., Smarandache, F.: A novel model for evaluation hospital medical care systems based on plithogenic sets, artificial intelligence in medicine. 31 August 2019 (in Press) 2. Lu, L., Shaowei, W., Li, Z., Pengqian, F.: The historical roles and current development of enterprise hospitals. Chin. J. Soc. Med. (4) (2009) 3. National Health and Family Planning Commission of PRC: China Health Statistics Yearbook [EB/OL] (2015). http://www.moh.gov.cn/zwgkzt/ptjnj/list.shtml,2016.7.25 4. http://www.gov.cn/xinwen/2017-08/26/content_5220497.htm. Accessed 26 July 2016 5. The State Council of the People’s Republic of China: Circular of the State Council on Printing and Distributing the Work Plan to Speed up the Divestment of State-owned enterprises from Their Social Functions and to Solve Historical Problems (Guofa[2016]No.19) [EB/OL]. http:// www.gov.cn/xinwen/2017-08/26/content_5220497.htm. Accessed 26 July 2016

250

Y. Wang et al.

6. State-owned Asset Reform Commission. Guiding Opinions on Deepening the Reform of Education and Medical Institutions Run by State-owned Enterprises, No. 134 [EB/OL] (2017). http://www.gov.cn/xinwen/2017-08/26/content_5220497.htm. 26 Aug 2017 7. Haifeng, X.: Study on the development and reform trends of enterprise hospitals [EB/OL]. https://www.cn-healthcare.com/articlewm/20171123/content-1018895.html. 23 Nov 2017 8. CN-Health Care: Enterprise Hospital will become a history and Its Replacements Continue to Mushroom [EB/OL]. http://www.zyzpes.com/toutiao/3207/20180701A1BL9U00. html. Accessed 1 July 2018

Financing Efficiency of SMEs in New Third Board Market in the Information Times Sheng Li1 and Aihua Zhang2(B) 1 Management School, Wuhan University of Science and Technology, Wuhan, Hubei, China 2 Management School, Hubei University of Education, Wuhan, Hubei, China

[email protected]

Abstract. In the information times, the speed and method of information transmission have changed, and the level of enterprise informatization will have an uninterrupted influence on the expansion and competitiveness of enterprises. Many SMES face the problem of low financing efficiency. This paper focuses on the research of financing adeptness of SMEs in the New Third Board market. We collect monetary statistics of 50 SMEs enumerated; use SPSS to scrutinize the dynamics that affect the funding competence in the first year after SMEs are listed. Through the analysis, we can see that profitability has an encouraging sway on sponsoring productivity. The growth capacity of creativities has a constructive impression on financing efficiency; capital structure has a destructive sway on financing efficiency. Business cycle and liquidity ratio have no significant impact on financing efficiency. We can conclude that the financing efficiency of the current SMEs is not high, and the composition of the capital structure, solvency and operating capacity need to be improved. Keywords: Information times · Financing efficiency · The new three board

1 Introduction In the information times, the capital market system shows an essential character in endorsing the coordinated expansion of capital markets at different levels and so long as investment and financing amenities for SMEs [1, 2]. The New Third Board has become the sanctuaries marketplace with the leading number of service companies in the domain. The rapid expansion of the market has also brought many problems. Financial expenses of listed companies increased by 40.5% year-on-year. The growth rate of medium-sized enterprises and minor enterprises reached 65.24% and 42.07%, and the share of financial expenditure in the income share increased by more than 0.2%, which shows that the current indirect financing costs of SMEs can be lower [3]. In recent years, increasing attention has been paid to the financing issues of SMEs, mainly focusing on life cycle, financing efficiency, credit guarantees, financing methods, and cost benefits and so on. Through an evaluation of the collected works, it is found that there are relatively limited readings on the financing efficiency of listed companies, and less research on the impelling aspects of planned companies’ financing efficiency © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 251–257, 2021. https://doi.org/10.1007/978-3-030-62746-1_37

252

S. Li and A. Zhang

[4]. Since the implementation of the new three-tiered layered system, although many scholars have been studying the effectiveness of the layered system during the period, the conclusions of their research are also limited due to the limitation of the availability of annual statement data [5]. This article mainly analyzes the financing efficiency, debt service ability, operating ability and growth ability of listed companies from 2012 to 2018, and analyzes the financing efficiency of companies. This article takes the financing efficiency as the main research line, collects relevant financial data indicators of 50 SMEs listed, and uses SPSS to analyze the factors that affect the financing efficacy of SMEs in the first year after listing. Find out the results of the company’s profitability, growth ability and capital structure affecting the financing efficiency of the company, and make recommendations on the results.

2 Theoretical Analysis and Research Hypothesis 2.1 Theoretical Analysis In the information age, there has been a substantial increase in the level of financing of companies on the New Third Board. But there are still factors affecting and restricting financing: (1) Enterprise size: The large-scale high-quality asset companies have more financing channels than small enterprises, easier to gain the trust of institutional investors and lower financing costs [6, 7]. (2) Financing costs: It refers to the capital expenditure incurred to pay the owner in order to obtain the right to use the funds to achieve the purpose of completing the transfer of funds, and these paid fees are the costs incurred by the corporate financing [8]. (3) Financing risk: Compared with large enterprises with open information and low cost of access to resources, due to their small size, insufficient human resources for high-tech R&D, imperfect internal management work, small and medium-sized enterprises are more prone to credit crises [9, 10]. (4) Capital Structure: When a company increases its debt financing ratio, it will reduce its financing cost and increase its financial risk. Therefore, an unreasonable capital structure will affect the operating costs of the enterprise, and then affect the internal profitability and play a certain inhibitory role in financing efficiency [11]. (5) Fund utilization: Increasing the utilization of funds can indirectly improve financing efficiency. [9] SMEs can broaden financing channels, strengthen capital management, comprehensively manage corporate fixed assets, and reduce idleness of corporate funds and equipment. (6) Enterprise profitability: There are many indicators to measure profitability. The stronger the profitability of an enterprise, the more helpful it is to the capital turnover of the enterprise, which will reduce the credit risk of the enterprise and increase its financing income [10, 12].

Financing Efficiency of SMEs in New Third Board Market

253

2.2 Research Hypothesis This paper believes that profitability mainly takes a huge influence on the financing efficacy of enumerated companies. There are two main indicators to show the profitability of an enterprise: the return on overall assets and the return on net assets. This paper selects the ROE as a measure. This paper believes that the company’s growth ability, operational capacity, capital structure, solvency and profitability may have a certain control on the financing effectiveness. It indicates the progression rate of net assets to reflect the development capability of enterprises. The advanced the net asset development rate, the better the business situation, the stronger market competitiveness and the stronger development. On the contrary, it shows that the business is not in good condition and growth is not good. This paper also chooses equity multiplier to represent capital structure. The higher the equity multiplier, the minor the percentage of capital put in by the vendor of the company’s assets and upper the balance level of the company. In terms of solvency, this paper uses liquidity ratio to express the solvency of an enterprise. 2.3 Indicators Selection This paper uses Guotai’an database to analyze the relevant financial ratios of 50 representative SMEs enumerated on the new third board from 2012 to 2018. Due to the small number of recorded companies in the previous year and the short time for the establishment of the New Third Board, the development is not perfect. Since 2012, the number of itemized companies in the New Third Board has grown hurriedly and the expansion has become more perfect. Therefore, the data analysis is based on 2012.

3 Statistical Description and Correlation Analysis of Samples 3.1 Statistical Description of Sample Variables From Table 1, we can understand that the ordinary return on net assets representing the financing efficiency of the sample companies is 5.64% and the median value is 10.5%, which is relatively high, indicating that the average financing efficiency of the sample new third board SMEs is better. The transformation among the extreme value and the minutest value is relatively high. However, the standard deviation is 29.88, which is relatively small, indicating that the financing adeptness of different SMEs in the new third board of the sample is relatively small. As can be perceived from Table 1, the average return on venture capital representing the profitability of the sample company is 26.65%, and the intermediate value is 9.68%. This value is relatively large, indicating that the sample company has higher profitability. The standard deviation is 411.09, which is relatively large, indicating that there is a big difference in the overall profitability of the sample new three-board listed companies.

254

S. Li and A. Zhang

Table 1. Statistical description of financing efficiency indicators for SMEs listed on the New Third Board Roe

Mean Median

Return on invested capital

Net assets growth rate

Business cycle (days/times)

Equity Multiplier

Current ratio

5.64

26.65

26.57

334.57

1.98

21.24

10.50

9.68

15.55

266.00

1.72

2.07

Maximum

50.22

7786.21

722.77

3516.00

19.88

Minimum

−226.18

−288.68

−233.22

0.00

1.02

5561.2 0.16

Standard deviation

29.88

411.09

66.99

358.75

1.32

299.29

Skewness

−4.52

19.22

3.79

4.52

8.77

199.25

Kurtosis

31.02

336.84

40.02

33.28

109.78

343.26

3.2 Relevance Analysis of Sample Variables Because there may be collinearity among variables, and multivariate linear regression take up that there is no correlation amongst the elements, under such detection, the test results may not be reliable, and the regression model may lack stability. Therefore, it is necessary to make a correlation analysis of the explanatory variables, as displayed in the resulting Table 2: Table 2. Relevance analysis of explanatory variables X1

X2

X3

X4

X5

X1

1.000

0.018 −0.063

0.056 −0.007

X2

0.018

1.000 −0.136 −0.003 −0.036

X3 −0.063 −0.136

1.000

0.130 −0.063

0.056 −0.003

0.130

1.000 −0.040

X4

X5 −0.007 −0.036 −0.063 −0.040

1.000

In the table: X1 represents the return on investment capital; X2 represents the growth rate of net assets; X3 represents the business cycle; X4 represents the equity multiplier; X5 represents the liquidity ratio. Through the correlation analysis among the explanatory variables, it can be understood that the selection of descriptive variables is appropriate, and there is basically no multiple collinearity among the explanatory variables.

Financing Efficiency of SMEs in New Third Board Market

255

3.3 Regression Analysis of Financing Efficiency of SMEs in the New Third Board It is necessary to establish the following models for its analysis: y = b0 + b1x1 + b2x2 + b3x3 + b4x4 + b5x5 + ξ

(1)

y represents the profit on remaining assets, as a dependent variable, indicating the financing efficiency of the enterprise; b0 represents a constant term; bn represents a regression coefficient of each explanatory variable; ξ is a unsystematic error tenure. Combined with the overhead information, linear regression analysis is carried out by using SPSS software, and the following information is obtained. As shown in the table below (Table 3): Table 3. Estimation of Multivariate Linear Regression Parameters Coefficientsa Unstandardized coefficients Model

B

Standardized coefficients

Std. Error Beta

Collinearity statistics

t

Sig.

Tolerance VIF

(Constant)

1.514

1.311

Return on invested capital

1.276

.032

.957

45.952 .000 .715

1.456

.024

.008

.058

2.743 .008 .779

1.315

−.002

.002

−.023

−.867 .387 .870

1.154

−2.211

.482

−.091

−4.568 .000 .882

1.141

−.001

.046

−.006

−.302 .774 .889

1.125

Net asset growth rate Business cycle Equity Multiplier Current ratio

1.181 .241

a. Dependent Variable: Return on net assets

The VIF values of the selected five constants are less than 10, which indicates that there is no multiple collinearity between them. Therefore, the regression equation can be obtained as follows (Table 4): y = 1.276x1 + 0.024x2 − 2.211x4 + 1.514

(2)

This table is the result of multiple linear regression analysis of ROE. According to this table, the goodness of fit test can be performed. Since this is a multiple linear Table 4. R2 test: model summaryb Adjusted Std. Error of the Model R 1

R Square R Square Estimate

0.956a 0.881

0.886

Durbin-Waston

7.5641821 2.082

a. Predictors: (Constant), Return on invested capital, current ratio, net asset growth rate, equity multiplier, business cycle (days/times) b. Dependent Variable: Roe

256

S. Li and A. Zhang

regression, it is necessary to observe the adjusted decision coefficient of 0.886, and the goodness of fit is high.

4 Conclusion Listing on the new third board can be an operative approach to develop the financing efficiency of SMEs. It can relief SMEs elucidate the inefficiency of financing problems, endorse the vigorous improvement of SMEs, and utilize the innovation vitality it deserves to indorse sustainable economic growth. However, the capital structure has an undesirable sway on the financing efficacy, while the operational capacity and solvency have little impact on the financing capacity. It can be comprehended that the financing efficiency of SMEs in the new third board market is not high, and the composition of the capital structure, solvency and operational capacity need to be improved. In order to expand the adeptness of financing, enterprises also need to improve their own capabilities in footings of development and cost-effectiveness. Acknowledgements. This work was supported by the Hubei Innovation Project (NO. T201940).

References 1. Dan, L., Asa, F.-B., Dan, P.: Current and future industry 4.0 capabilities for information and knowledge sharing: case of two swedish SMEs. Int. J. Adv. Manufact. Technol. 105(9), 3951–3963 (2019) 2. Shankar, K., Elhoseny, M.: Trust based cluster head election of secure message transmission in MANET using multi secure protocol with TDES. J. Univ. Comput. Sci. 25(10), 1221–1239 (2019) 3. Vidgenab, R., Mortensonc, M., Powellb, P.: Invited viewpoint: how well does the information systems discipline fare in the financial times’ top 50 journal list? J. Strateg. Inf. Syst. 28(4), 101–105 (2019) 4. Kim, H., Yasuda, Y.: Accounting information quality and guaranteed loans: evidence from Japanese SMEs. Small Bus. Econ. 53(4), 1033–1050 (2018) 5. Xing, R., Zhang, J.: Problems and countermeasures of the application of enterprise management accounting informatization. Agric. Sci. Technol. 18(8), 1555–1558 (2017) 6. Chit, M.M.: Financial information credibility, legal environment, and SMEs’ access to finance. Int. J. Econ. Bus. 26(3), 329–354 (2019) 7. Matulová, M., Fitzová, H.: Transformation of urban public transport financing and its effect on operators’ efficiency: evidence from the Czech Republic. CEJOR 26(4), 967–983 (2018) 8. Poshan, Y., Zuozhang, C., Jin, S.: Innovative financing: an empirical study on public–private partnership securitisation in China. Australian Econ. Papers 57(3), 394–425 (2018) 9. Mahfuzur, R., Aslam, M., Binti, I.I., Ruhana, I.C.: Factors affecting the financing cost of microfinance institutions: panel evidence. Enterp. Dev. Microfinance 29(2), 103–117 (2018) 10. Metawa, N., Elhoseny, M., Kabir Hassan, M., Hassanien, A.E.: Loan portfolio optimization using genetic algorithm: a case of credit constraints. In: Proceedings of 12th International Computer Engineering Conference, ICENCO 2016: Boundless Smart Societies, vol. 7856446, pp. 59–64 (2016)

Financing Efficiency of SMEs in New Third Board Market

257

11. Xun, L., Xiaoliang, Y., Simon, G.: A quantitative study of financing efficiency of low-carbon companies: a three-stage data envelopment analysis. Bus. Strategy Environ. 28(5), 858–871 (2019) 12. Ke, X., Chengxuan, G., Wei, X.: Research on financing ecology and financing efficiency of strategic emerging industries in China. J. Bus. Econ. Manag. 20(2), 311–329 (2019)

Application of Virtual Instrument Technology in Electronic Course Teaching Hui Cheng(B) Dalian Ocean University, Dalian, Liaoning, China [email protected]

Abstract. With the continuous progress of modern information technology and continuous reform of teaching methods, practice has become an important part of students’ in-depth understanding of theoretical knowledge. Experience has become an indispensable part of teaching and the most effective way to improve students’ creativity and practical ability. In order to improve experimental conditions and reform experimental teaching methods, this article is studying the application of virtual instrument technology in electronic course teaching. Increase students’ interest in experiments and improve teaching quality. Keywords: Virtual instrument · Electronic course · Application

1 Introduction In recent years, Due to the rapid development of virtual instrument technology and space transmission technology, it is possible to establish an experimental education system through virtual equipment. The virtual instrument teaching system will become an important aspect of student experience and distance education [1]. In addition, the construction of education and scientific research networks, libraries and other departments in Chinese universities and colleges has been basically completed, and the establishment of network labs in universities and universities has become the next major focus of school informatics [2]. With the rapid development of virtual hardware and network technology, a network laboratory can be established through network technology and virtual equipment.

2 Introduction to Virtual Instrument Technology Virtual instruments are new tools that complement data collection, control, analysis, processing, and display of test results, and recognize that “software and hardware” can assign the functions of the tool to maintain, expand, and update the tool. The virtual instrument “panel” is displayed on the computer screen. The tool is run by selecting different buttons with the mouse and combining keyboard input. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 258–263, 2021. https://doi.org/10.1007/978-3-030-62746-1_38

Application of Virtual Instrument Technology

259

3 Composition and Classification of Virtual Instruments Virtual instruments are generally composed of instruments and solutions, and adopt a unit structure. Figure 1 is a diagram of the overall structure of a virtual instrument. The main function of a virtual instrument is to acquire signals measured in the real world, while the function of the software is to control and integrate data acquisition, analysis, processing, display and other functions. They are in the command environment for instrument operation and operation.

Measured object

Signal conditioning

Data collection

Data processing

Virtual Instrument Panel

Fig. 1. Block diagram of the overall structure of the virtual instrument

There are many classification methods of virtual instruments, which can be divided into application fields and measurement functions, but the most commonly used are different interface interfaces of virtual instruments. The tool is divided into virtual parallel interfaces, virtual interface tools, virtual VXI tools, virtual PXI tools, Grid tools and the latest IEEE 1394 virtual instrument. DAQ virtual instruments are widely used in general test and industrial process control systems, and from the previous standard 16 bb to PCI 32 bb cards, thus providing better data acquisition and control capabilities for the design of different test tools. Of course, the virtual device needs to open the host structure connection, which is difficult to use and it is easy to input interference on the computer. Therefore, many external virtual instruments based on the standard configuration interface of public computers will become the direction of development. The external communication plan avoids noise inside the computer, which is especially suitable for low-signal applications, thus providing more space, better isolation and more suitable communications for device design [3, 4]. RS232 / RS422 interface is widely used in various foreign business control tools, supports long-term transmission, has strong interference ability, but the transmission rate is low. The parallel interface is also a traditional high-speed interface. Generally, printers have a parallel interface installed. Virtual instruments such as digital vibration and logic analyzers have appeared on the market. Of course, the global user chain transport aircraft and high-speed connection IEEEI394 will be more promising in the future. It becomes a computer’s USB and supports hot connect function. The IEEEI394 bus has become common in some advanced desktop and laptop computers. The biggest advantage of USB and IEEEI394 carriers is the high data transfer rate [5]. At present, the virtual instrument based on IEEEI394 has reached a transmission speed of 100 megabytes per second, which fully meets the requirements of high-performance dynamic testing [6].

260

H. Cheng

GPIB, VXT, and PX (bus) are computer interface buses designed for softwarecontrolled tools. Gebb’s tools include independent hardware operating interfaces, which can be independent of the computer, or can be connected to the computer through a standard gibb control cable. And PXI does not include a separate tool operation interface, which must rely on the virtual operation interface provided by the tool operation program.

4 Performance Characteristics of Virtual Instruments Virtual instrument is a new tool developed by computer technology. In the virtual instrument, the computer is at the basic position, and the computer software and test system are more tightly integrated, which has caused a significant change in the tool’s structural concept and design perspective. In terms of configuration and functions, the virtual instrument is a novel low-cost tool. It uses existing computers to match the corresponding equipment and special programs to form a sophisticated low-cost tool, which includes the core functions of common documents and common documents [7]. With special features. In terms of use, virtual instruments use a powerful graphical development environment to create a simple, flexible, and fast light board, which effectively improves the efficiency of the tool. The characteristics of virtual instruments can be summarized as follows: (1) Enrich and improve the functions of traditional instruments. A virtual central tool for analyzing signals, displays, storage, printing and other computer management, making full use of powerful data processing and transmission capabilities, making the system more flexible and simple. (2) Emphasize the new concept of “software tools”. Some traditional tools are replaced by a program in a virtual instrument. Since many vertical analog devices may drift over time and require regular calibration and use of standard transmitters, the accuracy and speed of measurement and the frequency of the instrument are greatly improved. (3) The instrument is defined by the user. By providing users with source code that can be used for their own tools, virtual instruments can easily modify the functions of paintings and tools, communication design, timing of tool operation functions, connection of terminals, networks, and other applications, and provide users with the full ability And imagination. (4) Open industry standards. The instruments and software of virtual instruments set open industry standards, increase the possibility of resource reuse, promote employment opportunities, achieve management standardization, and reduce maintenance and development costs. [8] (5) It is easy to build a complex and economical test system [9]. Virtual instruments can not only be used independently as test tools, but also use software engineeringbased virtual software tools to replace traditional hardware engineering tools, which can greatly save the cost of purchasing and maintaining the tool. In short, the appearance of a virtual instrument breaks the position determined by traditional tool makers and cannot be changed by the user. It uses a lot of software and

Application of Virtual Instrument Technology

261

hardware resources to break the boundaries of traditional data processing, expression, sending, display and storage tools, and has high performance. Compared with traditional tools, virtual instruments have the following characteristics: (1) This is a function rather than a physical tool. Virtual instruments use existing software and hardware resources, using software technology as a basic content, understand instrument and measurement and control equipment communication through dashboards and dashboards, integrate signal acquisition, analysis, and processing functions into a computer Become a processing center for data signal acquisition, control, and analysis functions, and replace traditional software tools. The concept of “software as a tool” is reflected in the development of modern tools; (2) The virtual instrument is a graphical user interface that reflects the concept of “what you see is what you get”. The traditional tool control panel was replaced with a floppy disk, and replaced with corresponding preparation options and output control of different virtual instruments. A graphical user interface (graphical user interface) makes the use of virtual instruments easier and provides instant online assistance. This is an advantage that traditional electronic tools cannot apply. (3) Quick update and good maintenance performance of virtual instruments. Users can customize its structure and functions. Because its core is in a specific development environment, users can carry out sub-development, modify and add functions of existing virtual instrument software. Compared with the development of electronic tools, the development cycle is greatly shortened and the cost is greatly reduced.

5 The Specific Application of Virtual Instrument Technology in Electronic Course Teaching 5.1 Research and Teaching In order to train high-quality electronic talents, many colleges and universities have purchased a large number of measurement and analysis tools to better conduct practical research in teaching and teaching. Traditionally, an instrument cannot meet the learning needs of students and is not conducive to promoting scientific and technological innovation. Virtual instruments can solve the problem of incomplete electronic laboratory equipment and many people participating in the same equipment; it can save equipment maintenance costs to a large extent, so that schools can also transfer more energy to electronic research and electronic education. 5.2 Electronic Curriculum System Aspect Virtual instruments play an important role in reconstructing the structure of electronic expertise and improving the electronic curriculum system. [10] The emergence and development of virtual instruments has had a significant impact on the teaching of electronic courses in schools. Traditional electronic courses have not paid enough attention to the use and operation of measurement tools, so traditional e-learning has ruled out the use of measurement and analysis tools reasonably. With the continuous development of

262

H. Cheng

simulation and computer technology, virtual instruments have gradually replaced traditional tools and become the main tools for detection and measurement. In order to meet market demand, schools must add relevant knowledge and skills from virtual elearning tools, which will greatly improve the electronic curriculum system and enrich the structure of electronic professional knowledge [11]. 5.3 Teaching Methodologies First, teachers can use virtual instruments to guide students to work in virtual laboratories. This kind of virtualization and simulation can effectively solve the problems of insufficient equipment, equipment damage and limited operating time. [12] The relationship between teachers and students can also be improved to the greatest extent. Teacher training and student practice can be combined to improve teaching efficiency and learning quality. Second, the advent of virtual instruments requires teachers to adopt typical teaching methods. Although virtual instruments have great advantages, they can shorten the time and time of practice and effectively improve the quality of teaching, but it also means that teachers’ teaching methods must be changed. Teachers need to review student learning projects, implement operational principles and methods through stereotypes, enable students to learn some electronic knowledge and skills, and obtain all professional electronic knowledge and skills through measurement. Third, the use of virtual instrument technology, simulation technology and Internet technology for distance learning activities. On the one hand, virtual instruments and simulation programs have the ability to interact between humans and computers. [13] We can share and share data and build a virtual laboratory based on computer technology to reveal the electronic laws behind electronic phenomena. On the other hand, Internet technology can collect different interface data of virtual instruments for real-time data, waveform and image analysis results, which also provides the basis for remote electronic courses. For example, we can use circuits to design spices, systems, and other simulation programs, and use them in most circuit and system simulation experiments, using ASP, connectors, and other tools to monitor relevant data in real time. 5.4 Teaching Evaluation The introduction of a virtual instrument greatly changed the preparation of teaching evaluation. Because traditional electronic measurement tools have limited functions and cannot reasonably analyze and process different data, teachers can only evaluate a small number of projects or a small number of students studying simultaneously in the teaching process. [14] Virtual instruments use a variety of technologies. The functionality of a virtual instrument is equivalent to that of many traditional tools. Virtual instruments have powerful storage, analysis, and processing capabilities. Under this influence, the development of teacher teaching evaluation shows a trend of diversification, that is, teachers can evaluate students’ ability to use virtual instruments at the same time, and they can combine actual teaching, tool operation and teaching evaluation so that before teaching Play a role in monitoring and diagnosing all education issues during, after and after.

Application of Virtual Instrument Technology

263

Although virtual instruments have many advantages, it is unrealistic to eliminate completely traditional experimental teaching aids. When designing electronic courses, we must learn from each other’s strengths, make up for each other’s weaknesses, combine traditional teaching methods with advanced teaching methods, and jointly encourage teaching diversity and maximize teaching results. Facts have proved that the use of virtual teaching tools can improve the level of educational technology, reform teaching conditions, strengthen the impact of classrooms, and improve innovation capacity. Acknowledgements. Fund Project: Project supported by the “Thirteenth Five-Year Plan” of Educational Science in Liaoning Province: Research on Practical Skills Cultivation and Innovation of Applied Undergraduate Automation Specialty (Subject No. JG18EB033)

References 1. Thakur, Sriti., Singh, A.K., Ghrera, S.P., Elhoseny, M.: Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed. Tools Appl. 78, 3457–3470 (2019) 2. Zhang, B., Chen, Z., Sun, W., et al.: Application research of virtual instrument in experimental teaching. J. Shandong Electric Power Univ. 13(5), 87–89 (2017) 3. Wu, X., Xu, W.: Status and prospects of application research of domestic virtual instrument technology. Modern Sci. Instrum. 8(4), 112–116 (2017) 4. Abdel-Basset, M., Mohamed, R., Elhoseny, M., Chang, V.: Evaluation framework for smart disaster response systems in uncertainty environment. Mech. Syst. Signal Process. 145 (2020) 5. Elhoseny, M., Shankar, K.: Reliable data transmission model for mobile adhoc network using signcryption technique. IEEE Trans. Reliab., June 2019, in Press 6. Zhu, M., Zhang, J., Pan, K., et al.: Virtual instrument technology and its teaching application. Technol. Products 4, 96–98 (2016) 7. Jiang, H.: Application of virtual instrument technology in college teaching. China Modern Educ. Equipment 15, 53–54 (2018) 8. Zheng, J., Gong, S.: Reform of circuit principle course. J. Electr. Electron. Educ. 29(3) (2017) 9. Elhoseny, M., Shankar, K., Uthayakumar, J.: Intelligent diagnostic prediction and classification system for chronic kidney disease. Sci. Rep. 9(1) (2019) 10. Yu, X., Lu ,W., Wang, S.: Selection and Innovation of Teaching Contents of Professional Basic Courses - Case Study of Circuit Principles Course of Tsinghua University. J. Electr. Electron. Educ. 28(3) (2016) 11. Li, P., et al.: Integration and optimization of “Principle of Circuits” and “Signals and Systems” course. J. Electr. Electron. Educ. 25(5) (2015) 12. Yang, L.: Introduction to Virtual Instrument Technology. Electronic Industry Press, Beijing (2015) 13. Liang, G., Dong, H., Zong, W.: Reform and practice of comprehensive teaching of circuit theory courses. China Electric Power Educ. 1, 89–91 (2017) 14. Ping, Q., Yue, S.: Discussion on “basic analysis of circuits” teaching based on course connections. J. Electr. Electron. Educ. 29(6) (2017)

A Solution for Internet of Things Based on Blockchain and Edge Computer Yan Zhou(B) College of Artificial Intelligence, Nanchang Institute of Science and Technology Nanchang, Nanchang 330108, China [email protected]

Abstract. The resources of Internet of Things devices is limited and some external resources are needed, while the centralized cloud solution can provide sufficient computing storage resources for the Internet of Things. But some constrained factors such as network bandwidth, large amounts of data cannot be timely processed by the cloud. The cloud is based on static password authentication and plaintext storage mechanism, though there are some security problems. The rise of blockchain technology provide a solution method for the Internet of Things security. In addition, the edge computer can shorten the distance of data processing and strengthen the real-time performance. Therefore, this paper provides a solution method based on the blockchain and edge computer for the internet of Things security. Keywords: Blockchain · Interment of Things · Edge computer · Security

1 Introduction With the rapid development of sensor, wireless communication, data analysis and processing, the internet of Things devices will become miniaturized and low-cost. It brights more possibilities to solve some problems with internet of Things in family, education and transportation, etc. Because the data of the initial internet of Things devices was very little, it can complete data processing tasks by using the limited resources [1]. However, when the internet of Things technologies have been applied in home appliance, traffic control, there are a large number of data. In 2010, Zhao believed the cloud computer provided a new chance to solve the data processing of internet of Things [2]. In 2014, Biswas thinked that the cloud computer could provide powerful resources, but there are some problems, such as heterogeneous connection, dynamic management, etc. [3]. In 2015, Farris used the edge computer and cloud computer to slove a problem of heterogeneous connection [4]. In 2016, Shi thinked that the cloud solution could not meet to real-time requirement of transportation processing, but the edge computer could solve these problems [5]. Since the internet of Things is connected to the internet, there are more and more security threats. Sharmeen pointed to the hack act of malicious attackers, who had directly © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 264–270, 2021. https://doi.org/10.1007/978-3-030-62746-1_39

A Solution for Internet of Things Based on Blockchain and Edge Computer

265

accessed the internal data of the internet of Things by bypassing the authorization [6]. The solution of cloud-based centralization was hard to guarantee security of widely dispersed internet of Things equirments. The multi-node distributed structure of internet of Things requirements was similar characteristics to the blackchain. Wu proposed a new security methods of double factors based on blockchain technology, so as to guarantee data security of smart devices. Christidis pointed that the blockchain technology could provide the security of an untrusted environment for internet of Things. This paper put forward a strict access control mechanism to regulate the behavior of internet of Things device and user on the external network, so as to ensure the security of internet of Things devices.

2 The Related Technology 2.1 Blockchain In 2008, satoshi nakamoto published a paper on cryptograpy forum, which fully elaborated the principle of bitcoin and blockchain technology. The blockchain is compose of block and chain. In blockchain, the data units of the stored permanently are block, the connected timestamps in chronological order are the chains. Therefore, some people believe that the blockchain is distributed ledger, which is recorded in chronological order, and maintained by nodes in the internet through consensus mechanism. The structure of a block is divided into block header and block body. The block header contains the characteristic information of the block itself, such as header hash, parent hash, timestamp, block transaction number and the block size, etc. The header hash is the most critical price of information, and has the same hash value as the next connected block. The blockchain structure is shown in Fig. 1.

Block header 1

Block header 2

Block header 3

Header hash 1

Header hash 2

Header hash 3

Parent hash 1

Parent hash 2

Parent hash 3

Timestamp 1

Timestamp 2

Timestamp 3

Merkle Root

Merkle Root

Merkle Root

Block body 1

Block body 2

Block body 3

Fig. 1. Blockchain architecture

The block body contains all verified and tradeable record information during block creation. The block examples we will use are shown in Table 1. As long as the newly

266

Y. Zhou Table 1. Comparision in the properties No

Operation/Event

Merkle root

State

1

Storage

1

Deny

2

Access

2

Allow

3

Query

3

Allow

generated block is generated and added to the end of the block chain, the data of the block cannot be deleted, which will ensure immutability of the data. According to the range distribution of blockchain nodes, blockchain can be divided into public chain, private chain and alliance chain. The public chain is completely open to the public, so anyone can directly access the blockchain without authorization. The private chain is established by an organization and are accessible only to certain authorized users. The alliance chain is mixture of public and private chains, which are accessible only to alliance users. Considering the problems of public chain in reliability and privacy security, it is difficult to deploy massively the alliance chain, so we chose smaller private blockchain to record information. In addition, Because the private chain is deployed the local plotform, the initial blockchain can be considered safe and reliable. 2.2 Edge Computer The edge computer is the processing of data at the edge of the network. For example, gateway of smart home can be an edge. For edge computer, some data processing will be completed in home gateway. Of course, if the amount of data is too large, the edge nodes cannot implement data processing timely or completely. The edge nodes must rely on the cloud to complete processing task, the edge nodes will take care of the simple preprocessing. Our solution thinks that the deployed edge node can meet the processing and computer for the internet of Things equirements.

3 The Structure of Interment of Things Based on Blockchain and Edge Computer The traditional centralized management model is very fragile, as soon as the central node is broken, the entire internet of Things equipment service will be paralyzed. So we must build a system of decentralized regulation. The framework consists of four layers: the perception layer, the edge layer, the data storage layer and the application layger. The perception layer, edge layer and data storage layer together form intranet. The intranet is mainly responsible for collecting, storing, analyzing and processing data. The application layer form the extranet, which is mainly responsible for providing the services for the intranet data.

A Solution for Internet of Things Based on Blockchain and Edge Computer

267

3.1 Perception Layer The perception layer includes all kinds of sensor nodes. We can get some information of temperature, humidity, air pressure, light and pressure by these sensors. Because these sensors have limited resources, they can only perform simple data-processing tasks. However, they can transfer complex computational tasks to the edge devices and ask the edge devices for completing processing. In addition, they also receive processing outcomes and complete various responses. Agents are device with strong communication and computing capabilities, whose task is to help nodes with weak communication capabilities or low communication requirement to communicate with devices of the edge and upper layer. But the sensor nodes with strong communication capability do not need agents, they directly communicate with the edge device layer. 3.2 Marginal Layer The marginal layer is make up of the smart contracts, which mainly runs on edge nodes. The smart contracts is a prewritten and deployed electronic contract, which contains two functional modules. One functional module is responsible for management internet of Things device and the point system of user trustworthiness. Other functional modules is responsible for analyzing the behavior of internet of Things device and giving rules for dealing with them. 3.3 Data Storage Layer The smart contract will be automatically executed when there are data store operation. First, the smart contract encrypts the data by using an elliptic curve cryptography algorithm. The encryption algorithm and corresponding decrypted private key are automatically selected by smart contract, which does not be leak to other devices or users. Second, the smart contract record the storage event of execution to the block of the blockchain. Finally, the various data of the internet of Things devices are processed by smart contracts and stored on the storage hardware of the edge device. In addition, some the activity events will also be recorded the block. 3.4 Application Layer The application layer is a platform, which can provide various services for users. In addition, the application layer is also interface to access the data of internet of Things. When the user send a service request to the platform, and the platform will send authenticated user request to the smart contract of the edge layer. After the smart contracts receives the user’s request, it first queries the user’s credibility score, then decides whether to provide the service after judging the rationality of the request, and feedback it to the application layer. The application layer verifies not only the user’s identity, but also the user’s request of rationality. The verification process can effectively reduce unreasonable or even malicious behavior, reduce the amount of information processed by smart contract, and avoid wasting system resources.

268

Y. Zhou

4 Data Processing and User Access The internet of Things is facing intrusion, DoS and other attacks. For internet of Things security, we design a security protection mechanism at the edge layer and application layer, where are vulnerable to security threats. 4.1 Data Processing In ordered to prevent internet of Things devices from stealing and abusing the resource of edge nodes, we design the defense mechanism. In ordered to improve response efficiency, the blockchain simple the process of IoT devices. The validation information is embedded in the data by requesting the IoT devices, which will be sent to the edge layer. Then the smart contracts checks the validation information and views the binding trust score. After the verification is passed, the smart contracts will allocate resources and process the received data in accordance with the credibility. After the processing is completed, some processing strategies will be triggered by the management rules of the smart contracts. By simplifying the authentication process, response time can be reduced, but the security will be reduced. Therefore, we can adopt a mechanism for dynamically updating device validation information, which dynamically update some verification information with a certain period. The mechanism can avoid some security attacks. 4.2 User Access Take the example of querying data, the user firstly requests the application layer to inquire about the data service. Then, the application layer asks the edge layer for the trust score of the identity binding based on the identity of the requesting user. The edge layer will feeds the queried confidence back to the application layer. After the application layer determines the user’s credibility, it will further interact with the user to verify the user’s legitimacy. In addition, after the verification is passed, the platform of the application layer will make a request to the edge layer to query the data. The decrypted data is transferred to the application platform after some processing by the edge layer. The application layer sends the encrypted data to the user after encrypting data with the user’s public key. Finally, the users will obtain the data of the query by using the private key. The processing of user access is shown in Fig. 2. 4.3 Production of New Block Whether it’s internet of Things device or user access, the every data operation will produce a record block. And the record block will be added to the block body. The processing is shown in Fig. 3. When the block record reacher the limit, the smart contract will help the datastore layer to generate a new block, which will be added to the data storage layer. Then, the new block will continue to record the access events.

A Solution for Internet of Things Based on Blockchain and Edge Computer

269

5 Provide service 2 Query confidence score

1 Request access data

User

4 Verify user validity

3 Confidence condition Application layer

Edge layer

Fig. 2. User access flowchart

Header hash:0000...e25 Parent hash:0000...e56

Block header

Timestamp:1531...462 Merkle root:2e11...32e 32

;storage;fe4

;allow

Block body

Fig. 3. Block record graph

5 Evolution This solution is different from the cloud-based internet of Things solution. Some performance estimates is shown in the Table 2. This solution is superior to the cloud-based internet of Things solution in terms of access control and real-time performance, which is realized by block chain and edge computing technology. Table 2. Comparision in the properties Property

Solution base on cloud

The solution

Access control model

Static password

Dynamic password

Storage model

Clipetext

Cryptograph

Security mechanism

Static password

Dynamic password, POW

Resource number

More

Medium

Real-time

Ordinary

Strong

Scale

large

Medium

270

Y. Zhou

Summary In this paper, we propose a solution of internet of Things based on the block chain and edge computer. Based on the analysis of the existing internet of Things technology and solutions, we found the shortcoming of the existing solutions and similarities between the internet of Things and structure of bitcoin. In addition, according to the security mode, we summarize the control strategy of strictly controlling the upper layer to access the lower layer and forbidding tampering with lower layer data. Therefore, we use the blockchain technology to record the operation, user and device behavior in the system and control the behavior of users and internet of Things device with the equipment, so as to ensure system security. In addition, the edge computing technology provides a reliable platform for us to process internet of Things data and deploy blockchain. Because the security mechanism of the blockchain WOP takes up a large amount of computering resources, it will cause resource shortage in the short term. However, this work is not the focus of this study, so the solution hasn’t further studied it, and only increased the interval of POW. Acknowledgement. This research was financially supported by Key scientific research projects of Jiangxi Provincial Department of Education (Grant NO. GJJ GJJ191100) and “13th five-year” plan of education science of Jiangxi province (Grant NO. 18YB295).

References 1. Chaudhary, M.H., Scheers, B.: Software-defined wireless communications and positioning device for IoT development. In: International Conference on Military Communications and Information Systems. IEEE (2016). https://doi.org/10.1109/ICMCIS.2016.7496555 2. Zhao, F.: Sensors meet the cloud: planetary-scale distributed sensing and decision making. In: 9th IEEE International Conference on Cognitive Informatics. IEEE (2010). https://doi.org/10. 1109/COGINF.2010.5599715 3. Biswas, A.R., Giaffreda, R.: IoT and cloud convergence: opportunities and challenges. In: IEEE World Forum on Internet of Things(WF-IoT). IEEE (2014). https://doi.org/10.1109/wfiot.2014.6803194 4. Farris, I., Militano, L., Nitti, M., et al.: Federated edge-assisted mobile clouds for service provisioning in heterogeneous IoT environments. In: IEEE 2nd World Forum on Internet of Things (WF-IoT) (2015). https://doi.org/10.1109/WFIoT.2015.7389120 5. Shi, W.S., Cao, J., Zhang, Q., et al.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016) 6. Sharmeen, S., Huda, S., Abawajy, J.H., et al.: Malware threats and detection for industrial mobile-IoT networks. IEEE Access 6, 15941–15957 (2018)

Discovery and Advice of Free Charging of Electronic Devices Yuhang Du(B) and Chen Wang Northeast Yucai School, Hunnan District, Shenyang 110000, Liaoning Province, China [email protected] Abstract. There are many free charging posts in public places, such as sockets and charging stations for electric vehicles. While users enjoy the convenience of charging anytime and anywhere, it also has certain impacts on public places. Our goal is to create a model to study the impact of these free plug-in charging posts on public places and to quantify these impacts. We will then discuss the extent of these costs and how they will be paid. Finally, we refine the models in different locations and propose two measures to reduce cost. Keywords: Energy · Cost · Charging

1 Introduction In recent years, as the living standard of people elevated, the need for electricity has also increased. In our houses, we purchase charging devices, and pay the electricity company for the fee. Many public places offer free charging today. In this article, we will discuss as the time passed by, the free charging devices will have what kind of influences on the public places and whether the users need to pay for it.

2 General Assumption • We use cell phone to represent the small items that need to charge in public places, and electric vehicles to represent the large items. • We consider the increase of population, the increase of the number of cell phones, and the increase of the number of electric vehicles as discontinuous process. • We don’t consider the loss cost of the electric vehicle charging stations. • We assume that the variables are independent of each other and the charging duration is normally distributed.

3 Model Design 3.1 Changes in Energy Consumption 3.1.1 Hypothesis of This Question To simplify modeling process, we only consider two types of charging devices when establishing the models, cell phone of the small devices and electric vehicle of the large devices. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 271–276, 2021. https://doi.org/10.1007/978-3-030-62746-1_40

272

Y. Du and C. Wang

3.1.2 Establishment and Solution of Regression Model To evaluate the change of the consumption of energy, our calculation consists of two parts, the charging of small devices and that of the large ones. 3.1.3 Small Item We can calculate the changes in energy consumption caused by cell phones charging, as shown in Table 1. Table 1. Small item energy consumption change table Year

Energy consumption (kwh) Rate of change

2010

1,168,378,998

/

2011

1,170,790,778

0.00206421

2012

1,179,364,587

0.007323092

2013

1,184,695,450

0.004520115

2014

1,188,977,280

0.003614288

2015

1,196,682,010

0.006480132

2016

1,203,992,089

0.006108623

2017

1,203,352,656

−0.000531094

2018

1,209,102,814

0.004778448

*2019 1,215,008,865

0.004884656

*2020 1,220,217,688

0.004287066

3.1.4 Large Item We can work out the annual changes in electric energy consumption caused by the charging of electric vehicles, as shown in Table 2. 3.1.5 Total Energy Consumption We draw the energy trends as Fig. 1 shows. The red line is the energy consumption by the small items, the green line is the energy consumption by the large items, and the blue line is the total energy consumption. 3.2 The Cost Model 3.2.1 Hypothesis of This Question In the cost consideration, we do not consider the additional cost caused by unexpected factors [1–3]. We assume that the depreciation rate and failure rate of all devices are basically the same, and the purchase cost of all devices is calculated according to the items with the highest sales volume on Amazon.

Discovery and Advice of Free Charging of Electronic Devices

273

Table 2. Large item energy consumption change table Year 2010

Energy consumption (kwh) Rate of change 6,965,166

/

2011

39,635,112

4.69047619

2012

137,737,082

2.475127848

2013

315,920,037

1.293645485

2014

534,788,407

0.692796734

2015

744,609,431

0.392344003

2016

1,038,731,079

0.395001237

2017

1,406,923,030

0.354463209

2018

2,072,680,515

0.473201072

*2019 2,236,833,635

0.079198467

*2020 2,728,316,398

0.219722538

Fig. 1. Model building process

3.2.2 Cost Structure Continuing with the first question, we divide discussion into the cost of charging small items and the cost of charging large items. 3.2.3 Cost Model Establishment and Solution Small Item We calculate the cost and the changes resulting from the charging of small items in public places annually, as shown in Fig. 2(a) (b). We can find that most of the charging costs brought by small items are because of the electricity fee. The purchase of hardware

274

Y. Du and C. Wang

such as sockets and hardware loss only accounts for a small part of the cost, and the cost of purchasing is decreasing year by year [4–6].

Fig. 2. The costs of small items (a) Annual costs (b) The changes in annual costs

Large Item We calculate the annual cost of charging large items in public places and the change in cost as shown in Fig. 3(a) (b). It can be found that most of the charging costs brought by large items also come from the electricity fee. The purchase and installation of charging stations only account for a small part of the cost, and the purchase cost is basically stable.

Fig. 3. The costs of large items (a) Annual costs (b) The changes in annual costs

Discovery and Advice of Free Charging of Electronic Devices

275

3.2.4 Total Cost (the Users and Governments Burden Costs Are not Calculated) We can draw a figure as shown in Fig. 4(a), and the changing of the cost as Fig. 4(b) shows, and find that in the overall analysis, whether it is small items or large items charging in public places, the cost of purchasing hardware and maintaining hardware accounts for a very small proportion of the total cost, and the main cost comes from the electricity fee.

Fig. 4. Total cost (The users and governments burden costs are not calculated) and changes

3.3 Cost Reduction Initiatives 3.3.1 Problem Analysis In this question, we need to explore the measures to reduce the cost. We can reduce the cost from two aspects: the electricity cost on the one hand, and the hardware cost on the other. We will analyze and adjust our cost model separately from these two aspects. 3.3.2 Reduce Electricity Cost Measures We can develop a price strategy that is positively correlated with the trend of the load. That is, we can adopt a higher fee when the charging load is high and a lower fee when the charging load is low. In this way, the resources of charging facilities can be better utilized, and can also affect the charging time of users. In addition, more income can be obtained during peak periods, thus, reducing the cost. This strategy of using different methods to collect fee in different time periods can reduce the cost of electricity in public places. 3.3.3 Reduce Hardware Cost Measures We design a charging device structure that mimic a beehive. We transform the original 1 to 1 charging device into 1 to 6 charging devices. In this case, we only give an assumption, without considering whether it is possible to achieve 1 to 6 charge. If we can achieve

276

Y. Du and C. Wang

this structure, we can reduce the purchase amount of charging devices to 1/6 of before, and also reduce the purchase cost of hardware to 1/6 of before, and keep the electricity charge efficiency unchanged.

4 Free Charging: Discovery and Advice Based on the data collection and mathematical model establishment of free charging in public places, we get to know that charging for free in public, which we have already used to, is bringing so much cost for public places. We also call on everyone to save as much electricity as possible. After all, coal-fired power accounts for 63.46 percent of the electricity generated in the US, and the energy used to generate electricity is not renewable.

References 1. Mauri, G., Valsecchi, A.: THE impact on the MV distribution grids of the Milan metropolitan area. In: IEEE Energy Engineering Conference, 27–29 March 2012, Shanghai, China, p. 5 (2012) 2. Bayram, I.S, Michailidis, G., Devetsikiotis, M.: Electric power resource provisioning for large scale public EV charging facilities. In: 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE (2013) 3. Bendiabdellah, Z., Senouci, S.M., Feham, M.: A hybrid algorithm for planning public charging stations. In: Global Information Infrastructure & Networking Symposium. IEEE (2014) 4. Nijhuis, P.J.: Urban fast charging stations: a design of efficient public charging infrastructure for large numbers of electric vehicles in cities (2015) 5. Gharbaoui, M., Bruno, R., Martini, B., et al.: Assessing the effect of introducing adaptive charging stations in public EV charging infrastructures (2015) 6. Xiong, H., Xiang, T., Zhu, Y., et al.: Electric vehicle public charging stations location optimal planning. Dianli Xitong Zidonghua/Autom. Elect. Power Syst. 36(23), 65–70 (2012)

Design and Implementation of Tourism Information Management System Based on .NET Yue Meng, Jing Pu, and Wenkuan Chen(B) Sichuan Agricultural University, Chengdu, China [email protected]

Abstract. This article relates to the operation mode of the tourism industry to complete the development mode to carry out the design operation. The intention is to use the synergy between many software technologies and corporate market departments to assist the tourism industry in the implementation of many related departments and other affairs to achieve better work efficiency and facilitate highlevel implementation decisions deal with. The main contents are: the previous investigation and analysis of the completed tourism development, clarifying its management needs, process information, and model types and making clear analysis and processing in accordance with the actual needs; collecting and mastering software engineering related knowledge. Then, the obtained requirement analysis is actually consistent with the system development, and the performance and functional standards to be performed by the target system are obtained. And use ASP. NET technology to get the architecture and functional composition of the system to complete the process; explore the database design and implementation process and other information to clarify the details of the database design that the system needs to implement. With a targeted explanation of the implementation process and implementation effects of each key module, the overall system implementation effect is analyzed and determined based on the obtained system test situation, and it is determined that the related work of system testing is well implemented necessity. Keywords: .NET · Tourism information management · Design and implementation · Information flow

1 Introduction With the continuous progress of material development in recent years, people’s spiritual pursuits have also increased, and the corresponding tourism industry has developed rapidly. Leaving the endless hustle and bustle of the city and city, no longer consider the various pressures brought about by work and life, go to a place with beautiful scenery and relax myself [1]. Especially the combination of network technology strength and computer technology strength in recent years has made tourism-related letter and systems optimized and progressed, and tourism-related business implementation has become © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 277–284, 2021. https://doi.org/10.1007/978-3-030-62746-1_41

278

Y. Meng et al.

more convenient and efficient. If the industry is to seek long-term growth and progress, it must be able to meet the needs of users to arrange travel arrangements with more convenient travel paths, better service results, and better experience, and where the users need to perform their work. Seeking a better new model of tourism development. At present, there is not much investment in tourism [2]. Everyone has the ability to arrange the required travel. Although it is not a necessary part of life, it is indeed a new way for people to seek spiritual satisfaction. In the statistical analysis provided by the country, it is clear that the growth of the existing tourism industry is the key point of the domestic economic growth rate, and the subsequent growth rate will continue to be in the range of 10% [3]. However, the development effect of the existing tourism industry is more different than that of developed countries. Model management and the realization of data sharing cannot meet the needs of the current economic development. The development of intensive and precise tourism is a trend in the future. A comprehensive understanding of the characteristics of the development of tourism can help people better realize the management of tourism development. First, the tourism industry has been able to complete transactions beyond the form of physical exchange, and the two parties to the transaction have realized the theme of interconnecting their information. Therefore, to ensure more effective progress in the tourism industry, it must be clear that the information part is organized; The tourism industry’s own development has a strong correlation effect, which involves not only simple food and lodging, but also transportation arrangements [4]. Only when these related departments provide more efficient information support, then the overall tourism development matters will be even more important. So many tourism development characteristics also make it extremely important to perform efficient information construction on it. The key to completing information construction is to use relatively basic information acquisition methods, and use the acquisition of these information to ensure that more information is effectively applied and processed, so as to achieve the growth of the human spiritual level and promote the development of, and this is also the necessary path for China to follow up with the international community.

2 System Requirements Analysis Due to the impact of the growing information technology in the tourism industry, people engaged in the industry have begun to focus on the development of information technology in tourism. To this end, various information application systems have emerged. This article briefly describes the current status and future development trends in the field of tourism confidence management from the following three aspects: 2.1 The Promotion of Tourism Products Based on the Internet Since the development of the tourism industry does not actually require the government to intervene in the spontaneous consumption activities of the people, the intensity of its publicity will be an effective counterfeiting method for businesses engaged in the tourism industry [5]. Due to the advent of computer networks, more businesses are turning

Design and Implementation of Tourism Information Management System

279

their propaganda to the online approach under new media, which is less investmentfriendly and widely spread. Most merchants are committed to enriching online resources, so a large number of websites carrying characteristic tourism and related information of their respective merchants have temporarily filled the entire network. Even many travel agencies and tourism agencies in China have begun to focus on online tourism [6]. Resource information. Since such websites can freely support people who will use computer operations to preview and legally use the tourism resource information placed on their web pages, this has also disguised the development of the tourism industry and strengthened the team of “donkey friends”. 2.2 Provide Links to Online Booking Services Relevant businesses engaged in the tourism industry have established their own websites in order to promote their own tourism characteristics and attract people’s attention. Through this website, people can not only refer to the tourist information they want to know, but also can perform price consultation, accommodation booking, and experience virtual scenery. In this way, the relationship between the two parties of consumption is brought closer, while the cost of the intermediate intermediary link is reduced, which provides more convenience for tourists. The application that supports tourism information management can reduce the workload for workers in the industry while improving work efficiency, so that it can provide passengers with more efficient, fast, and high-quality service items. 2.3 Commercialization of Tourism Consumption Due to the development of network technology, the tourism industry has begun to apply it to a number of service projects. In order to meet the needs of people to buy travel products without leaving home, merchants have begun to open online payment models to support people’s travel consumption. At the same time, a variety of product payment methods such as credit card channels, online banking channels, and member channels were opened [7]. Unlike other industries, the tourism industry uses this module to make it more convenient for people to operate and use. It only requires the use of a computer to make payment according to the needs to achieve a one-stop service for tourism consumption.

3 System Design 3.1 Overall System Design As shown in Fig. 1 below: As an open and complex application for the management of travel letters, in order to achieve the management of various subsystems similar to attraction information, hotel information, and shopping information, as well as information interaction with various other systems such as transportation environment to ensure the normal operation of the system, an information flow is established between the subsystems to support service and feedback operations [8].

280

Y. Meng et al. Local market

Service

Environmental guarantee

Feedback

Real-time information

Guest Domestic market International market

Marketing

Attractions

Local market

Hotels

Support subsystem

Booking service

Traffic

Restaurants

Travel service

Entertainment

Buy

Shopping

Fig. 1. Structure of the tourism information management system

3.2 Database Design of the System During the implementation of the required functions of the entire information system, a database needs to provide effective support for it. Therefore, in the process of implementing the database construction, it is necessary to give full attention to the security and reliable effects of its information preservation and prevention and control processing. The specific principles to be followed during construction are: First, operations such as data management and processing are easy to complete. Considering that the original purpose of the database application layer is to better optimize the redundancy of data information content and the efficiency of operation execution under the condition of consistent functions, the implementation of development should be strictly attached to the convenience of the function control processing; second, during the implementation of the program, it is necessary to minimize the occupation of various resources reserved in the system and provide strong guarantees to increase operational efficiency [9]. Third, the log content and the specific data capture database are used to complete independent storage control, which is convenient for accidental intrusion. Just-assisted logs help achieve database recovery. Here will be combined with the system analysis content given earlier to complete the database analysis and design work. Considering the quality of database construction will affect the overall operating efficiency and implementation effect of the system, so we should focus on it here. In terms of structural design, the design of the conceptual part and the physical part is completed with the help of relatively accurate E-R diagrams [10]. The former focuses on the analysis of the relationship between the entities in the database; the latter focuses on the effective design of the forms involved in the database. In the completion of the conceptual model analysis, the E-R design needs to be done, and the supplementary control of the related content. During the second period, the information content model construction process will be completed with reference to the needs of the user. Use the name and number of the route as the primary key to build

Design and Implementation of Tourism Information Management System

281

an ER map of the tourist route with five attributes including type, price, and time. The details are as in Fig. 2. Route type Route time

Route number

Route

Route name

Route price

Fig. 2. ER diagram of tourist routes

3.3 Function Modules of the System The implementation of the six functional modules related to the management information program in the tourism industry is explained in detail here, mainly because there are too many related functional modules in this aspect and it is not easy to explain them one by one [11]. Relying on the information management functions formed by the six aspects of hotel resource information, message information, travel landscape information, travel resource information, and travel route alternatives and travel-related news information. (1) Implementation of hotel module The purpose of building a management module for travel hotels is to provide travelers with convenient and fast real-time hotel information for their choice. Through this module, hotel information containing their respective names, star ratings, prices, and their scenic spots can be distinguished and released according to star ratings and scenic spots. It can also support users to perform multiple operations, such as browsing and booking, for the hotels they need through the Internet. It can also support the staff responsible for managing travel information after interacting with related hotels to delete, modify, and add multiple operations to manipulate travelers’ online booking orders and related information. In this module, the system is mainly implemented by adding, modifying, deleting, and querying the four sub-function modules for the hotel information in the scenic spots [12]. (2) Implementation of the message module The system also builds a function similar to most program software that guestbooks can cover, which mainly supports users to carry out feedback operations. It is mainly composed of two parts for the administrator to check and respond to the user’s message and to support the user to leave a message and display it. (3) Implementation of tourist landscape map module The module is constructed by listing exquisite scenic pictures of various tourist attractions in the form of thumbnails for users to view. The pictures arranged in the

282

Y. Meng et al.

module page are sorted according to their upload time. Users can choose different according to their own preferences. Click on the small landscape image on the search page for the name of the tourist image of the scenic spot. Aiming at the four manipulation forms of adding, modifying, deleting, and searching for tourist attractions and scenery maps, the author’s construction of this function is also divided into corresponding four parts for specific implementation. In the construction of this unit, the author pays more attention to the functional design of supporting the response to users’ search and browsing of picture resources and the realization of the management function of travel pictures. Among them, the former is mainly responsible for finding out all the relevant pictures stored in the database according to the prompts of the user’s specific keywords, and performing thumbnail display. In this way, users can view the pictures they are interested in. Users can view more information and details through the single-frame diagram information; the latter mainly supports the execution of operations such as publishing, modifying, and deleting travel pictures. (4) Implementation of tourist attractions module In order to make it easier for users to obtain the details of the scenic spots involved in each scenic spot, the system also builds a number of functional modules that support the scenic spots as a unit to browse and manage scenic spots. The main parts are: 1. Management function modules for adding, deleting, and modifying operations for scenic spots and scenic spots; 2. Supporting the scenic spots module browsing and display functions in two forms: scenic spots list and scenic spot details. Through the construction of the browse display function, you can search the database for the relevant scenic spot information corresponding to the keywords pointed by the user, and provide the form of display links to help users view the details of the scenic spots they need [10]. The support for the implementation of its management module is implemented for the related operations of saving database data of scenic spots in the system, and mainly implements operations such as adding, deleting, and modifying scenic spots and scenic spots. The part of the source code that can support the execution of related functions is not described in detail. (5) Implementation of tourism news module This unit module constructs an implementation platform that supports the release of tourism-related information and is responsible for operation and maintenance tasks by the administrator. The types of news published on this site are mainly based on service guides and travel information. In order to facilitate the management and management of the administrator, the author has built three sub-function modules based on news browsing operations, publishing operations, and management operations. In this way, it is convenient for the operator to add, delete, modify and manage the module and the news released. According to the structure chart of the travel news system constructed above, we have designed its functions from the aspects of arranging news, browsing news, and managing news: The use mechanism is: the administrator will open the latest travel letter through the relevant control, and the system database It can display and match the corresponding simple sentences or key prompts on the homepage of the news browsing page and supports detailed information reading links [12]. Users can view news related information here according to their interests and needs.

Design and Implementation of Tourism Information Management System

283

Its management function is mainly to facilitate the system administrator to delete, modify and update the travel news information. The following figure is its operation interface diagram. (6) Implementation of tourist traffic line module The system also builds a platform that can support the release of travel routes including accommodation standard information, en route attractions information, and various related information such as travel arrangements [9]. Through the platform’s real-time updated travel schedule details, passengers can choose according to their needs. The best travel route can also make it easier for managers to formulate the best travel plan that is more convenient for tourists, based on the differences in time and scenic areas and the adaptation to the crowd. The system also provides an online booking link. With this link, users can realize the operation of booking the travel routes they need without leaving the home. The background manager of the system can not only perform various operations such as adding, deleting, updating, and modifying the line arrangements in the platform, but also control the passengers’ line booking orders. This unit supports multiple operations such as classification, modification, addition, deletion, and display of reservation management for the tourist route: in the display section, it can be divided into two types of display: journey type arrangement and content details; in the management section, it can support background managers various operations such as the addition, deletion, modification and release of each route, as well as the classification of tourism types. According to the structure diagram of the part constructed above, it can be seen that its function realization module mainly includes two parts for browsing and management of the route. The unit function support code is implemented after the construction of its database is completed. The following figure is the page view of its control interface.

4 Conclusion Based on the B/C model, a management process that can support the tourism industry to perform management of its related information is implemented in the article. In order to show the real-time and accuracy of tourism information, the author has also integrated various new technological concepts to It is simple, practical and easy to operate. The system implemented in the end is not only used to help the tourism management organization to carry out related management operations, but also benefits the tourism provider and people who travel. To a large extent, it has promoted the rapid development of tourism. After focusing on the analysis of the current information management system in the tourism industry, find out its shortcomings. After combining the future development direction of the industry, it summarizes the aspects that need to be improved. In order to better provide people with convenient electronic and intelligent business-oriented tourism information management systems for people’s travel, it will be the direction that people who work in this field will work hard. After conducting a full range of exchanges and consultations on the current information management system of the tourism industry and the application of the tourism system, including provider

284

Y. Meng et al.

managers and travelers, a system logic function that includes all the performance to be implemented by the system is feasible. Acknowledgments. Study on the livelihood vulnerability of farmers and its countermeasures in the giant panda national park community, project number: GJGY2019-YB006.

References 1. Schröter, B., Hauck, J., Hackenberg, I., Matzdorf, B.: Bringing transparency into the process: social network analysis as a tool to support the participatory design and implementation process of payments for ecosystem services. Ecosyst. Serv. 3(4), 206–217 (2018) 2. Schröter, B., Matzdorf, B., Hackenberg, I., Hauck, J.: More than just linking the nodes: civil society actors as intermediaries in the design and implementation of payments for ecosystem services–the case of a blue carbon project in Costa Rica. Local Environ. 23(6), 635–651 (2018) 3. Hassannia, R., Vatankhah Barenji, A., Li, Z., Alipour, H.: Web-based recommendation system for smart tourism: multiagent technology. Sustainability 11(2), 323–324 (2019) 4. Min, W., Ku, J.: Tourism information system based on sharing economy using an integrated information communication technology platform. Int. J. u- and e-Serv. Sci. Technol. 9(5), 279–290 (2016) 5. Xu, B., Xu, L., Cai, H., Jiang, L., Luo, Y., Gu, Y.: The design of an m-Health monitoring system based on a cloud computing platform. Enterp. Inf. Syst. 11(1), 17–36 (2017) 6. Scheepens, A.E., Vogtländer, J.G., Brezet, J.C.: Two life cycle assessment (LCA) based methods to analyse and design complex (regional) circular economy systems. Case: making water tourism more sustainable. J. Cleaner Prod. 11(4), 257–268 (2016) 7. Lee, E.K., Shi, W., Gadh, R., Kim, W.: Design and implementation of a microgrid energy management system. Sustainability 8(11), 1143–1144 (2016) 8. Nesshöver, C., Assmuth, T., Irvine, K.N., Rusch, G.M., Waylen, K.A., Delbaere, B., Krauze, K.: The science, policy and practice of nature-based solutions: An interdisciplinary perspective. Sci. Total Environ. 5(9), 1215–1227 (2017) 9. Gil, L., Ruiz, P., Escrivá, L., Font, G., Manyes, L.: A decade of food safety management system based on ISO 22000: a GLOBAL overview. Revista de Toxicología 34(2), 84–93 (2017) 10. Zhang, Z., Xu, G., Zhang, P., Wang, Y.: Personalized recommendation system based on WSN. Int. J. Online Biomed. Eng. 12(10), 91–96 (2016) 11. Psaltopoulos, D., Wade, A.J., Skuras, D., Kernan, M., Tyllianakis, E., Erlandsson, M.: False positive and false negative errors in the design and implementation of agri-environmental policies: a case study on water quality and agricultural nutrients. Sci. Total Environ. 57(5), 1087–1099 (2017) 12. Hawkins, S.J., Allcock, A.L., Bates, A.E., Firth, L.B., Smith, I.P., Swearer, S.E., Todd, P.A.: Design options, implementation issues and evaluating success of ecologically engineered shorelines. Oceanogr. Mar. Biol. Annu. Rev. 5(7), 169–228 (2019)

A Computer Model for Decision of Equipment Maintenance Spare Parts Reserve Yunxing Wang(B) , Weishan Zhou, Jingjing Zhao, and Mengwei Wang Qing Zhou High-Tech Institute, Qing Zhou, Shan Dong, China [email protected]

Abstract. It is considered that reserving a reasonable quantity of spare parts is an effective measure to increase equipment availability and reduce life cycle cost. Keeping the demand and configuration of equipment maintenance spare parts balanced is an important part to determine a reasonable amount of spare parts reserve. According to reliability theory and maintenance decision theory, under the assumed condition that the lifetime distribution and maintenance time distribution of weapon equipment are subject to exponential distribution, this paper concludes the decision models of two kinds of equipment maintenance spare parts, respectively repairable parts and irreparable parts. Keywords: Equipment maintenance · Spare parts · Decision · Calculation model

1 Introduction In general, various devices are composed of numerous parts (or components), and some parts (or components) of the device may break down while using, thus affecting the performance of equipment. Therefore, it is necessary to reserve a reasonable quantity of spare parts during the service period, ready to replace the failed parts, which is an effective measure to improve equipment availability and reduce life cycle cost. With the increasing complexity of equipment, the variety and quantity of spare parts become more and more, and the proportion of the support cost of spare parts in the support cost of equipment use is also increasing. Under the limited funding condition, the optimal configuration of spare parts variety is essential, to ensure that the spare parts required in the use and maintenance of equipment can be timely and adequately supplied [1–3]. To determine the number of spare parts, the calculation model of spare parts must be established first. In the 1970s, the U.S. military issued an order that it was necessary to use mathematical models to determine the number of spare parts. This shows that the mathematical model plays an important role in determining the quantity of spare parts. However, the calculation of mathematical models should be well-reasoned. US military materials also acknowledged: “Calculating the demand for spare parts involves risks and uncertainties. Although mathematical methods are used to predict the demand, it is still common for some spare parts to be stored too many or too few at the moment.” The © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 285–292, 2021. https://doi.org/10.1007/978-3-030-62746-1_42

286

Y. Wang et al.

existing research results and spare parts management experience show that the selection of mathematical models to calculate spare parts should follow the following principles [4]. 1) Theoretically reasonable, universal and representative; 2) Less computing requirements, and easy operation; 3) The calculation results are similar to that of other models.

2 Analysis on the Decisive Calculation Model of Maintenance Spare Parts Reserve The reserve quantity of maintenance spare parts is related to the reliability and maintainability of the equipment. According to the general use experience of the equipment, and also for convenience, it is assumed that the life distribution and maintenance time distribution of the equipment are subject to exponential distribution. In addition, under the condition of modern technology, the structure of the equipment becomes more and more complicated, and the types of the components constituting the equipment also become more and more various. However, from the aspect of maintenance results, it can be attributed to irreparable parts and repairable parts. Irreparable parts mainly refer to consumable spare parts and partially damaged spare parts, and repairable parts are replaceable parts that provide repair turnover. This paper mainly studies the decision analysis of repairable and irreparable maintenance spare parts [5–7]. 2.1 Decision Analysis of Irreparable Spare Parts Reserve When the irreparable parts in the equipment system break down, replacing the parts is a quick and easy method that is often used. If the equipment and spare parts together are regarded as an equipment system, and the time of replacing the failed parts and the failure rate of the spare parts in the reserve period are negligible, the equipment is equivalent to a cold reserve system. If a certain irreparable part of the equipment fails, then the equipment breaks down and the spare part needs to be replaced immediately. There are n spare parts, and the equipment breaks down after n spare parts all have failed. Suppose the life of n + 1 vulnerable parts are random variables T0 , T1 , T2 , …, Tn . T0 is the component used in the equipment. The total life of the equipment is T = T0 + T1 + · · · + Tn . Its task reliability is: Rn (t) = P(T0 + T1 + · · · + Tn > t)

(1)

Suppose that the random variables are mutually independent, so that the density function fn (t) of the life distribution of the system is the convolution integral of the density function fi (t) of the life distribution of n + 1 components, namely: fn (t) = f0 (t) ∗ f1 (t) ∗ · · · ∗ fn (t)

(2)

A Computer Model for Decision of Equipment Maintenance Spare Parts Reserve

287

2.1.1 The Working Life of a Spare Part In the decision-making of maintenance spare parts reserve, the life distribution of components is exponential distribution. Suppose the failure rate is λ, and it can be obtained by the above Formula (2) that when there is a spare part, the life distribution density function of the equipment is: 

t

fn (t) =

λ0 e−λ0 (t−x) λ1 e−λ1 x dx = λ0 λ1

0

e−λ0 t − e−λ1 t λ1 − λ0

(3)

Due to the reliability Rs (t) and average life expectancy Ts of the equipment are respectively:  Rs (t) =

+∞

e−λ0 x − e−λ1 x dx λ1 − λ0 t λ1 λ0 = e−λ0 t + e−λ1 t λ1 − λ0 λ1 − λ0 λ0 λ1

(4)

2.1.2 The Working Life of n Spare Parts When the life distribution of n spare parts is the exponential distribution with failure rate λ, the reliability of the system proved by mathematical induction is: (λt)n −λt (λt)2 + ··· + ]e 2! n! n  (λt)k −λt e = k!

Rs (t) =[1 + λt +

(5)

k=0

The average life expectancy of the equipment is: Ts =

1+n λ

(6)

2.1.3 The Working Life when the Equipment Needs L Components Working at the Same Time Since the reliability of each component is e−λt , the system only works when L components work at the same time, and then the system reliability of such L components is e−Lλt . If any one of the components in the equipment fails, the part needs to be replaced by spare part immediately, so the reliability of the system remains unchanged until L spare parts are used up [8, 9]. Together with the spare parts, the reliability and average life expectancy of the equipment are: Rs (t) =

n  (Lλt)k k=0

k!

e−Lλt

(7)

288

Y. Wang et al.

Ts =

1+n Lλ

(8)

The two methods of Formula (8) and (9) are mainly used in determining the quantity of irreparable spare parts reserve. If the reliability of the equipment is used as the target (the reliability target value is usually determined by the user and the contractor together), to determine the spare parts reserve, n can be calculated inversely from Formula (8) after the reliability is given; if the utility time of the equipment is given to obtain the minimum reserve of spare parts, Formula (9) can be used for calculation. 2.2 Reserve of Repairable Spare Parts There would be a situation of the equipment in the work process: there is a fragile part, and another n repairable spare parts for backup. If the failure rate of spare parts at work is λ, the parts are immediately repaired after the replacement, suppose the fault spare parts can only be repaired one by one, the repair rate is μ, and the replacement time is negligible, the failure rate of spare parts during the reserve period is 0, and K = μ/λ is recorded as repair rate. 2.2.1 The Average Time T of Spare Parts Lack for the First Time For the above system with n spare parts, there are n + 1 states, represented by S0 , S1 , S2 , …, Sn . S0 represents that the working components are normal, n spare parts are prepared aside for cold storage; S1 represents that one spare part is in repair, and n − 1 spare parts are prepared aside; S2 represents that one spare part is in repair, one spare part is waiting for repair and n − 2 spare parts are prepared aside …; Sn represents that only the working components are normal, one spare part is in repair, and the rest spare parts are all waiting for repair. The state transition is shown in Fig. 1.

Fig. 1. Diagram of the system state transition of repairable spare parts

The equipment in Si state may transfer to Si+1 state due to the fault, or Si−1 state due to the repair of spare parts, and the state transition probabilities are respectively λ and μ. The average of the system’s staying time in Si state is recorded as Ti , and then the average value T of the time before the occurrence of spare parts lack of the system is: T=

n 

Ti

(9)

i=0

Obviously, the average of transition times for the equipment transferring from Si state to Si+1 state should be λTi ; and the average of the transition times to Si−1 state should be μTi . One-time transition from Sn state to the lack of spare parts results in the event of spare parts lack,

A Computer Model for Decision of Equipment Maintenance Spare Parts Reserve

289

Therefore, Tn =

1 λ

(10)

Although the repair rate of spare parts is often greater than the failure rate (μ > λ), that is, the average time between failures is often greater than the average repair time, this is only an average of random events and the event that new fault occurs when the spare parts have not been repaired is not excluded, so that the spare parts would be lacking. Describe this situation by state transition, that is, the number of the transitions from Si state to Si+1 state is one time more than the number of the transitions from Si+1 state to Si state, namely: λTi − μTi+1 = 1 μ 1 + Ti+1 = Tn + KTi+1 λ λ

Ti =

(11) (12)

In the formula, K is the repair rate. Thus, Tn can be calculated by Formula (11), then Ti (i = 0, 1, 2, · · · , n) are calculated by Formula (13), and T is finally calculated through Formula (11). When n is a lot, this calculation is complex. Through the derivation of the above formulas, the average value T of the time when the equipment lacks spare parts for the first time is obtained. When K = 1, T=

n 

Ti =



n 

i=0

Ti

i=0 n+1 

Tn ( = K −1

i=0

K i+1 −1 K−1

 Tn

 n+2  K −1 Tn − (n + 2) K − n − 2) = K −1 K −1 i

(13)

When K = 1, Formula (13) can be written as: Ti = (n − i + 1)Tn Thus, T=

n 

Ti = [1 + 2 + 3 + · · · + (n + 1)]Tn

i=0

=

1 (n + 1)(n + 2)Tn 2

(14)

2.3 Determining the Minimum Spare Parts Reserve According to the Time of the Spare Parts Lack for the First Time According to Formula (14), n can be calculated inversely with the known T . However, the time of spare parts lack for the first time in the formula is an expectation value, and the reliability of equipment working to this time is only 36.7%. Therefore, the quantity of spare parts determined by Formula (14) is the minimum spare parts reserve, that is,

290

Y. Wang et al.

the least spare parts reserve for the equipment working for a period of time without lacking spare parts. To facilitate the calculation, the solution can conducted based on four situations. When K = 1, based on Formula (15), for each additional spare part, the average value of the first spare part lack would be increased by (n + 2)Tn . Calculate n from known T , and get a quadratic equation from Formula (15): n2 + 3n − 2λT + 2 = 0, Its positive root is: √ −3 + 9 + 8(λT − 1) n1 = (15) 2 Use Formula (16) to find a positive root n1 of n, which is the minimum reserve of spare parts. When K ≈ 1, solve the first approximate solution n1 of n from above formula, and then substitute this value n1 into Formula (14) to get the second approximation n2 of n, which is the minimum reserve quantity of spare parts when K ≈ 1.  n2 +2  K −1 Tn − (n1 + 2) T= (16) K −1 K −1 λT (K − 1)2 = K n2 −2 − (n1 + 2)(K − 1) − 1 n2 =

lg[λT (K − 1)2 + (n1 + 2)(K − 1) − 1] −2 lg K

(17) (18)

The minimum reserve of spare parts n1 when K = 1 is taken as the first approximation solution,and is substituted into Formula (19) to obtain the second approximation n2 of n. If the difference calculated between n2 and n1 is small (less than 1), the larger one of the two is the required spare parts reserve n; if the difference calculated between n2 and n1 is very large, n2 can be used to replace n1 in Formula (19), to further get the third approximation solution n3 , until the difference between ni and ni+1 is less than 1, the larger one is taken as the required n. (3) When K > 1, if K > 1.5, n is larger, then K n+2 >> 1, (n + 2) in Formula (11) can be ignored, and T approximates to:

T=

Tn (K n+2 − 1), λT (K − 1)2 + 1 = K n+2 (K − 1)2

(19)

lg[λT (K − 1)2 + 1] −2 lg K

(20)

n=

After using Formula (21) to get the first approximation n1 of spare parts quantity n, similar to the calculation method when K ≈ 1, Formula (19) is used to get the approximate solution n2 , n3 , …, until the difference between the adjacent approximate solutions is less than 1, and the greater one is taken as the required spare parts quantity n.

A Computer Model for Decision of Equipment Maintenance Spare Parts Reserve

291

If 1 < K < 1.5, and K n+2 >> 1 fails to work, Formula (14) is difficult to be simplified. In this case, two kinds of limit cases are considered first, and Formula (16) and Formula (21) are respectively applied to get the spare parts reserve quantity n1 and n2 when K = 1, K > 1.5 and K n+2 >> 1, thus through transforming Formula (14), get:  n+2  K Tn −1 f (n) = (21) − (n + 2) − T K −1 K −1 Obviously, f (n1 ) > 0 and f (n2 ) < 0, so that Formula (22) and dichotomy can be applied to take n1 and n2 as the initial points, to conduct stepwise approximation on the minimum reserve of spare parts, and get division points n3 , n4 , …, until the difference between adjacent points is less than 1, and the one meeting f (n) > 0 is the required spare parts quantity n. (4) When K < 1, if K is smaller and n is larger, K = 0.8 and SA/MA < 1.2, DA is marked as qualified, and when SA/MA < 0.8, DA is marked as unqualified. Add the sum of students’ abilities as SB, the average of the average of all abilities of all students is recorded as MB, record the student’s total ability achievement as DB, in order to prevent students from becoming too diverse in their abilities, DB is marked high when SB/MB >= 1.2, DB is qualified when SB/MB >= 0.8 and SB/MB < 1.2, and DB is unqualified when SB/MB < 0.8. The output evaluation period of the course is one year, adjust the curriculum system and training plan in time for students’ ability changes every year, make the new engineering course system more reasonable. The specific cases of applying this model are shown in Table 4. The lowercase letters represent the assessment results of courses offered, and different numbers represent the benefits generated by the courses corresponding to different training abilities. In this case, SA/MA was used as the calculation method, and the redundancy of 0.2 was used as the adjustment, as shown in Fig. 2.

a/n = 1



1

1

1

Type rate



Student

Company

Professor

2

2

2



0.8 = 0.7 c/a < 0.7

c/a 0.2

2

0.4 0.10). H2 is partially verified. We constructed the SEM to test the difference between two alliance fitness dimensions: QA = γ11 · PF + γ12 · BF + ε1 AT = β21QA + γ21 · PF + γ22 · BF + ε2 PI = β31QA + β32AT + γ31 · PF + γ32 · BF + ε3

Impact of Alliance Fitness on Smart Phone Brand Alliance

325

(QA = Perceived quality; AT = attitude preference; PI = Purchase intention; PF = product function complementary; BF = brand image consistency) The results show that the fitting indexes of the model reach the ideal level and the overall fitting is good (see Fig. 2 for the results). Based on the path load in Fig. 2, we calculated the total effect, direct effect and indirect effect of each dimension of alliance fitness on the three aspects of brand alliance evaluation.

Fig. 2. Fitting results of structural equation model M1

Results show that, in the perceived quality dimension of brand alliance, the total effect of product function complementary is significantly greater than image consistency (PFte = 0.74, t = 7.48). BFte = 0.15, t = 1.37). In the dimension of attitude preference and purchase intention, the total effect of product function complementary is also relatively higher (attitude preference: PFte = 0.49, t = 6.00; BFte = 0.37, t = 4.89; Purchase intention: PFte = 0.49, t = 6.00; BFte = 0.37, t = 4.89), which is contrary to our hypothesis of H3 and the conclusion of Simonin and Ruth (1998). We believe that this may be caused by difference of stimuli in this study and previous studies. Siomin and Ruth (1998) used automobile brands as theirs stimuli. Besides its functional feature as a traffic tool, automobiles have become a symbol of social status. Therefore, brand image may have a greater impact on evaluation in their study.

4 Conclusions 4.1 Alliance Fitness Has Two Dimensions This paper analyzed alliance fitness from the brand association perspective, verified its composition and dimensions through CFA. Results confirmed that the alliance fitness has two dimensions namely product function complementary and brand image consistency. Product function complementary is based on product attributes, to bring the complementary function to consumer; while brand image consistency means user image and brand personality of partner brands is congruency to consumers. That means when companies are choosing their alliance partner, Partners fit with their own brand in both product and brand perspective will bring more positive effects.

326

F. Wu et al.

4.2 Two Dimensions of Alliance Fitness Have Different Impacts on Brand Alliance Two dimensions of alliance fitness have positive impact on brand alliance evaluation, but the impact results, paths and degrees are different. Product function complementary has a significant positive effect on the perceived quality, attitude preference and purchase intention of brand alliance, while the effect of brand image consistency is mainly reflected in the dimensions of attitude preference and purchase intention. The effect of product function complementary on brand alliance evaluation is greater than that of brand image consistency. Acknowledgement. This work is supported by the National Social Science Fund Major Project (Research on Quality Governance System and Policy to Promote High Quality Development), No.18ZDA079. And the Dean fund project of China National Institute of Standardization under grant No. 552019Y-6660.

References 1. Samuelsen, B.M., Olsen, L.E., Keller, K.L.: The multiple roles of fit between brand alliance partners in alliance attitude formation. Mark. Lett. 26(4), 619–629 (2014) 2. Keller, K.L.: Strategic Brand Management, 2nd edn., pp. 101–103. Prentice Hall, Upper Saddle River (2003) 3. Veloutsou, Cleopatra: Brand evaluation, satisfaction and trust as predictors of brand loyalty: the mediator-moderator effect of brand relationships. J. Consum. Mark. 32(6), 405–421 (2015) 4. Lee, J.K., Lee, B.K., Lee, W.N.: The effects of country-of-origin fit on cross-border brand alliances. Asia Pac. J. Mark. Logist. 30(5), 1259–1276 (2018) 5. Lee, H.N., Lee, A.S., Liang, Y.W.: An empirical analysis of brand as symbol, perceived transaction value, perceived acquisition value and customer loyalty using structural equation modeling. Sustainability 11(7), 1108–1112 (2019) 6. Retamosa, Marta., Millán, Ángel, Moital, Miguel: Does the type of degree predict different levels of satisfaction and loyalty? A brand equity perspective. Corp. Reput. Rev. 07, 9–15 (2019) 7. Schiffman, L.G., Kanuk, L.L.: Consumer Behavior, 7th edn., pp. 342–345. Prentice Hall, Upper Saddler River (2000) 8. Washburn, J.H., Till, B.D., Priluck, R.: Brand alliance and customer-based brand-equity effects. Psychol. Mark. 21(7), 487–508 (2016) 9. Bluemelhuber, C., Carter, L.L., Lambe, C.J.: Extending the view of brand alliance effects. Int. Mark. Rev. 04, 78–89 (2013) 10. Maiksteniene, K.: Modeling brand alliance effects in professional services. Waset.Org 31–38 (2013)

Effective Control Method of the Whole Process Project Cost Based on BIM Linlin Yu(B) Hubei Business College, Wuhan, China [email protected]

Abstract. Engineering industry is one of the important industries in the process of economic development. In the aspect of project investment, how to achieve the expected effect with the minimum investment under the premise of ensuring the project quality has become the topic of common concern of all stakeholders. In view of the difficulty of the traditional project cost control which is not refined and time-consuming, this paper proposes an effective control method of the whole process project cost based on BIM. BIM technology is used to control the cost of the whole process of the project, so as to realize effective management and avoid out of control investment. Through the actual case, the results show that the method presented in this paper has obvious advantages in time consumption and estimation accuracy, and the satisfaction of management personnel, construction personnel and supervision personnel has reached more than 85%. Keywords: Whole process engineering management · Cost control · BIM (Building information Modeling) · Effect evaluation

1 Introduction The cost of construction industry has always been a topic of concern for the contractors, investors and other relevant personnel [1]. For example, the real estate market sales did not show a strong trend, the house did not sell out, the builders have to find a way to control the construction cost of the project. The process from planning to construction to final completion of the building is very long. Once the project cost is not well controlled, it is likely that the follow-up work cannot be carried out [2]. Only by actively strengthening the project cost control of the whole project can we be sure to adapt to the development of market economy, so as to enhance our competitive advantage in the construction field and achieve long-term and healthy development [3]. Therefore, in the process of the project, under the premise of ensuring the quality of the project, the whole process of effective control of the project cost can avoid the bad phenomenon of out of control investment to the maximum extent. At present, the investment utilization rate of engineering construction is not very good, and the input and output are not positively related, that is to say, the input is very high but the output is poor, and the production efficiency is getting lower and lower © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 327–332, 2021. https://doi.org/10.1007/978-3-030-62746-1_48

328

L. Yu

with the development of time [4]. Engineering cost control involves many fields, such as housing, highway, subway and so on, which are studied by experts and scholars. In [5], considering the maintenance cost of the overhaul project, the author compares and selects the project design scheme and strictly screens it in the design stage to reduce the pressure of capital control. In [6], in the aspect of urban tunnel construction, the author takes a project of Lanzhou Metro as an example for the cost control of shield machine construction. According to the work process, the author regularly carries out comparative analysis with the target to reasonably control the cost. In [7], aiming at the cost control of EPC project, the author strengthens the cost management from the aspects of design, implementation, procurement and completion to realize the effective control of the whole process project cost. Although the above research has been effective in engineering cost control, there is still room for further optimization. At present, there are some shortcomings in the cost control methods, such as insufficient refinement, low level of project cost informatization, and attaching importance to the results while ignoring the process [8]. In view of the difficulties existing in the project cost, referring to the foreign construction information research, the author intends to introduce BIM (building information modeling) technology into the effective control of the whole process project cost. Based on BIM Technology, this paper analyzes the whole process of engineering cost, in order to provide reference for the long-term healthy development of engineering cost management industry.

2 Relevant Concepts of BIM and Project Cost 2.1 BIM Related Concepts In the 1970s, a concept of building information model was proposed, namely building information modeling, referred to as BIM [9]. The emergence of BIM Technology has brought good news to the field of engineering construction. The core of BIM Technology is information, which well parameterizes and models the design, construction, management and other relevant information of the project construction process, including all the information and processes in the whole project life cycle [10]. For example, the construction progress, construction process management, related maintenance process, as well as all features, single cost and geometric information of the building, the spatial topological relations of all information are centralized and stored in the database by using the method of 3D Boolean operation, and finally form a digital model. Because of the accuracy of calculation, the comprehensiveness of information storage and the convenience of use, it greatly improves the efficiency and accuracy of project cost management. It has the characteristics of parameterization, visualization, simulation, coordination and exportability, saves a lot of redundant costs, and ensures the realization of project management investment objectives. It has been widely used in the construction field in China and even in the world recognition, and more and more widely used. 2.2 Relevant Concepts of Project Cost Management The project cost management, in fact, is to ensure the final economic benefits of the project, take the ultimate goal as the principle, use scientific technology, and conduct the

Effective Control Method of the Whole Process Project Cost

329

behavior of the whole project cost from multiple angles consistent with the policies and laws. There are two kinds of project cost management. The first is construction project investment cost management. The second is project price management. In the first kind of project cost management, it means to measure the project cost in advance or monitor the price change in order to achieve the expected investment goal under the existing project design scheme. As for the second kind of project cost management, from a small perspective, it can be the cost control, bidding and other activities when the production enterprise realizes the management goal again. From a large perspective, it can be the government’s price control through economic, legal, policy and other ways to regulate market behavior. Our country is short of natural resources. If we want to maintain a relatively stable development speed, we must invest more funds. However, the amount of capital is too large to complete the fund-raising, so how to achieve the expected goal or even higher than the expected goal with less investment has become a hot topic in the industry.

3 BIM Based Whole Process Cost Control Process Method (1) Cost control in decision-making stage The first scientific decision is very important for a project to be completed. In the decision-making stage, it mainly compares various schemes and carries out feasibility analysis, so as to maximize the income result with the minimum investment cost. In the aspect of cost control in this stage, multiple alternative investment schemes are selected, BIM technology is used to compare the cost, and the optimal benefit scheme is finally selected. In this way, the estimation deviation of investment can be minimized. The BIM model engineering body is built by Revit, the geological model is constructed by Inforsworks and GIS software, and the investment estimation, schedule and other indicators of the project are integrated with the financial software. If there is any modification, the parameter modification operation can be made quickly to guarantee the decision-making. (2) Cost control in design stage The goal of cost management in the design stage of a project is to make a construction budget with an error of less than 12%. On the premise of ensuring the project quality, the construction of the project shall be completed with the minimum time consumption and energy consumption. The design unit can use BIM technology to carry out design analysis on energy conservation, sunshine, lighting, ventilation, sound insulation and noise of the project entity, and timely change the information model, analyze the impact on the project cost, and realize the comparison, selection and continuous optimization adjustment of the scheme within the control range. (3) Cost control in bidding stage In this stage, it is mainly to complete the control of reasonable bidding methods, and select more capable contractors within a reasonable bidding price. In terms of cost management, it is necessary to follow the principle that, in order to facilitate investment control, the bid price of the project shall not be higher than the bidding control price, but the price shall not be too low, because this may lead to Jerry

330

L. Yu

building and material cutting. In the aspect of cost control, BIM model is used to obtain the information of the whole project, avoid omission, and obtain the price close to the market price from the software, so as to control the bidding price reasonably. (4) Cost control in construction stage The cost control here is mainly reflected in comparing the planned cost with the actual cost, making changes, claims, project payment and other links. Depending on BIM design model, the quantity and cost of any part of the project can be obtained. In addition, through the application of BIM related software, it can not only achieve on-time settlement, but also accurately purchase and pick up materials according to the project schedule, add time schedule and cost information to the BIM model, and automatically extract resource use plans such as capital plan, material purchase plan and labor plan in each stage of the project. (5) Cost control at completion stage In the completion stage, the main concern here is the possible problems of settlement. For example, the engineering quantity is falsely reported, the charging standard is maliciously increased, and the cost is reported in disorder. By using BIM Technology, all the physical information, geometric information and other attributes of engineering entity can be loaded into BIM model, such as material, factory information, engineering quantity, price and construction progress of each component. When settling accounts, both sides can settle accounts on the same model, effectively avoiding differences, and making the work in the completion stage fast.

4 Effect Analysis of Project Cost Control Based on BIM In order to verify the effectiveness of the whole process project cost control method based on BIM proposed in this paper, the method proposed in this paper is applied to the actual project. At the same time, the traditional cost control method is used for cost management, which is compared with the method proposed in this paper to evaluate the effectiveness of the method proposed in this paper. In the management decision-making stage, the traditional method and the method proposed in this paper are used to control the cost and make the decision-making scheme. The time spent and the estimated error of the two methods in the resulting scheme are shown in Fig. 1. From Fig. 1, it can be seen that the BIM based whole process engineering cost control method proposed in this paper has obvious advantages in both time consumed and cost estimation error. In the same project, the traditional method needs 30 days to make decision-making plan, and its estimation error is 31.23%; the cost control method proposed in this paper gives the cost plan in 7 days, and its estimation error is only 10.51%. In contrast, the method proposed in this paper not only takes a short time, but also is more accurate. It can also update the scheme quickly according to the actual changes, and the effect advantage is very obvious. The progress of the project is interfered by people. Once there is a problem in the project, people of all kinds of work are required to communicate and coordinate with each other to ensure the orderly progress of the project, including management personnel,

Effective Control Method of the Whole Process Project Cost

331

Fig. 1. Time consumption and error comparison of different methods

construction personnel and supervision personnel. In this paper, people from these three types of work are interviewed to evaluate their satisfaction with the BIM based whole process engineering cost control method. The satisfaction is shown in Fig. 2.

Fig. 2. Satisfaction degree of different types of work

Through the investigation of management, construction and supervision personnel, among the interviewees, the number of people satisfied with the BIM based whole process cost control method proposed in this paper is more than 85%, indicating that BIM based project cost control is very suitable for the effect of relevant personnel in promoting the project.

5 Conclusion BIM technology can help improve the accuracy of project calculation, arrange resources more reasonably, control design changes and realize data accumulation and sharing. Of course, in practical application, there are also problems such as inconsistent standards

332

L. Yu

and high technical difficulty, which need to be solved by relevant personnel. People’s cognition of BIM technology needs to be improved. The potential of BIM Technology is unlimited. In the future, BIM technology will surely receive more attention and recognition.

References 1. Jieying, L.: Key points and control of construction project cost budget control. Build. Mater. Decoration 8, 140–141 (2019) 2. Jie, Q., Hongcheng, L., Haixia, J.: How to strengthen the construction cost management of salt chemical enterprises. Salt Sci. Chem. Ind. 46(8), 49–51 (2017) 3. Yang, C.: The importance of cost control in the whole process of construction project management. Green Build. Mater. 137(07), 214 + 216 (2018) 4. Botong, S., Jie, Z., Yong, W., Yaning, L.: Analysis of the relevance and ripple effect of Beijing real estate industry based on input-output model. Eng. Econ. 26(9), 44–48 (2016) 5. Yonghong, Y., Wanzhong, Y., Xuancang, W.: Research on cost control of highway overhaul project. Highw. Eng. 42(2), 76–80 (2017) 6. Pan, Y.: Cost control of shield tunnel construction in urban tunnel construction. Rail. Eng. Technol. Econ. 33, 56–68 (2018) 7. Dexin, Z.: Analysis of engineering cost control points of EPC general contracting project. Min. Eng. 14(3), 1–3 (2016) 8. Wei, W., Lejia, L.: Application of BIM technology in engineering cost management. Residential Real Estate 10X, 104 (2018) 9. Lau, S.E.N., Zakaria, R., Aminudin, E., Saar, C.C., Wahid, C.M.F.H.C.: A review of application building information modeling (BIM) during pre-construction stage: retrospective and future directions. IOP Conf. 143(1), 012050 (2018) 10. Deguang, Z.: Application of BIM technology in the construction process of prefabricated building engineering. Residential Real Estate 9, 229 (2019)

Research and Design of FPGA Embedded System Dandan Jiang(B) Zhengzhou University, Zhengzhou, Henan 450000, China [email protected]

Abstract. Facing the huge domestic demand, the current relatively backward status of my country’s automatic quantitative measurement control instrument technology urgently needs to be changed. How to improve the measurement accuracy and measurement speed at the same time has always been one of the problems to be solved by factories, enterprises and research fields. Under this background, this paper designs a dual processor dynamic measurement system based on FPGA. This system has dual processors to share different control links and work on the same chip. Compared with the currently widely used single processor structure products, it has a higher processing capacity while significantly reducing costs. This paper optimizes the design of the FIR digital filtering algorithm based on FPGA, and uses a combination of software and hardware to carry out system integrity design, design process analysis, application module design of each internal system, and optimized programming of each functional module such as FIR digital filtering. Software design, configure the system NiosII soft core, construct a design scheme based on FPGA and digital filter system, and implement the design scheme with FPGA. Through careful research on the compound sampling filter algorithm and the drop compensation method, this article builds an experimental platform for the system, selects Cyclonell EP2C8 as the main chip, and two NiosIIl soft cores as processors, realizing high-precision real-time measurement of powder-like materials, Achieved good results, and laid the foundation for further research in the future. The experimental results show that the 9-bit embedded multiplier used in this paper occupies 4 of the total 36; the global clock resource occupies 6 and the utilization rate is 75%. The above results fully show that the system makes good use of FPGA EP2C8 resources. Keywords: Dual processor · Embedded system · Feedback control · Dynamic measurement

1 Introduction With the rapid development of electronic technology, control technology and computer technology, CPLD, FPGA, SOPC, embedded systems and other new technologies continue to develop, based on FPGA and NiosII embedded programmable system-on-chip (SOPC) with its flexible design, hardware and software Programmable, tailorable and © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 333–339, 2021. https://doi.org/10.1007/978-3-030-62746-1_49

334

D. Jiang

other features and advantages, at the same time, it has outstanding characteristics such as small size, strong performance, low power consumption and high reliability [1, 2]. The system can customize the CPU and its peripheral interfaces according to the needs of the software, especially the reconfigurable feature of Nios II brings greater flexibility and adaptability to the design of embedded systems. It proposes a design for embedded systems. The new construction method has changed the traditional system design mode of fixed CPU chips [3, 4]. As China’s entry into the WTO accelerates and the investment and trade environment continues to improve, an inevitable trend is that internationally renowned heavy packaging companies will further increase investment and productivity in China, which will inevitably bring certain As a result, it is imperative to comprehensively upgrade the technical content of China’s weighing packaging manufacturing industry [5, 6]. In view of the current situation in China and considering that the current export targets are mainly Southeast Asian, Middle Eastern and African markets, in the future, China’s quantitative packaging machinery manufacturing industry should focus on the development of fast, low-cost packaging equipment [7, 8]. Make the equipment develop in the direction of smaller, more flexible, multi-purpose and high efficiency [9, 10]. In this paper, the two methods widely used in metrology system, such as composite sampling filter algorithm and drop compensation method, are studied in depth, and a new feedback control method is designed to make the system have online real-time control capability and improve the system’s metrology accuracy. Mainly research the design method of digital filters based on FPGA, mainly design and analyze from the aspects of function analysis, structural design, algorithm establishment and optimization, program design, simulation, etc., and finally pass the hardware experimental test. The feasibility and effectiveness of the FPGA-based SOPC system platform design are verified. This paper builds an experimental platform for system verification, and uses a composite sampling filter algorithm, a drop value compensation method, and a feedback control method to control the feeding system. The comparison of different results shows that the feedback control method can work continuously. Under the conclusion of maintaining a good measurement effect.

2 Design of FPGA Embedded System 2.1 Memory Selection This design uses SDRAM and FLASH to form the embedded hardware storage part. NiosII embedded soft core is built in FPGA, SDRAM is used as data memory, and FLASH is used as program memory. Below I will make a detailed analysis of the above parts. (1) SDRAM The SDRAM chip used in this design is MT48LC4M32B2F5-7. The chip is packaged in FBGA, has 90 pins, the clock rate is up to 143 MHz, and the capacity is 128 Mbits. In this system, it acts as a data storage, the actual operating rate is 125 MHz.

Research and Design of FPGA Embedded System

335

(2) FLASH The FLASH chip used in this design has EPCS4. EPCS4 is used to store the FPGA hardware logic code, which is compiled and generated by QuartusI1; it is used to store the C language program, which is compiled and generated by NiosIIIDE, and is used as the program memory of the embedded system. When the circuit board is powered on or reset, the FPGA downloads the hardware code from EPCS4, constructs the hardware system (including the NiosIICPU inside the FPGA), and then NiosIICPU downloads the solidified C language code into SDRAM to fetch instructions for the CPU to execute. To realize the embedded hardware system in SOPCBuilder, CPU, memory and peripheral interface are the most basic three elements of the embedded hardware system. Because FPGA itself does not contain CPU and peripheral interface, in order to build the CPU core and peripheral interface needed, Altera’s development software SOPCBuilderi is used for design. 2.2 FIR Filter Algorithm Establishment and Optimization The finite impulse response filter is the most basic unit in the digital signal processing system. It can have strict linear phase frequency characteristics at any amplitude and frequency characteristics, and its unit impulse response is limited, and there is no input to output. Feedback is a stable system. The expression of the relationship between the output sequence y(n) of the N-order FIR filter and the input time series x(n) is: n=1 h(i)x(n − i) (1) y(n) = i=0

That is, the output sequence y(n) is the convolution of the unit pulse corresponding h(n) and the input sequence x(n), and the structural relationship diagram can be obtained from the convolution relationship, which is called a direct structure, and a total of N multiplications are required in this structure. Device. Each sample y(n) needs to perform n times of multiplication and n − 1 times of addition operation to achieve the sum of multiplication and accumulation. For linear phase FIR digital filters, the unit sampling response is antisymmetric or symmetric, that is, h(n) = ±h(N−1−n), then the use of symmetry can simplify the network structure, if h(n) Is even symmetry and N is even. y(n) =

n=1 i=0

h(i)x(n − i) =

 N2 −1 i=0

h(i)[x(n − i) + (n − N + m)]

(2)

The FIR digital filter is a sectioned delay line, which weights and accumulates the output of each section, and finally obtains the output of the filter. 2.3 Dynamic Measurement Signal Processing The digital filtering method is mainly a digital filter developed on the basis of an analog filter. It is a linear discrete system with frequency selectivity, which can realize hardware

336

D. Jiang

functions through software. It is characterized by great flexibility, high precision and good stability. Estimation method is a basic method of dynamic weighing. One of its theoretical foundations is probability statistical analysis. Strictly speaking, it is also a filtering method, but the estimation process is performed in the time domain. The comparison rule is to compare the known mass with the mass to be measured to eliminate the effect of motion acceleration.

3 The Experimental Research of FPGA Embedded System 3.1 Digital Filter Function Digital filtering is widely used in various fields such as speech processing, noise elimination, harmonic reduction, and pattern recognition. It is a basic signal processing unit. In the process of data communication, temperature and voltage drift, noise interference and other problems can be eliminated. The main function of digital filtering is to filter out some useless frequency components from the signal. After the signal is digitally filtered, it actually multiplies the signal spectrum and the frequency response of the filter to analyze from the time domain. It is the convolution sum of the impulse response of the input signal and the filter. 3.2 Implementation of Mutually Exclusive Hardware Access This system uses hardware five exclusive modules to achieve access to shared RAM, instead of software to improve access speed through hardware access. This mutually exclusive module can also be regarded as a shared resource, which has the function of “test and set”. First, the NiosII processor is tested to see whether the mutually exclusive module is feasible. If it is feasible, it is obtained in a certain operation. When the NiosII processor ends the use of shared resources related to the mutex module, the mutex module is released. At the same time, another processor can obtain the mutually exclusive module and use the shared resources. Without this mutual exclusion module, two separate test and setup instructions are needed to implement the above functions, and a “deadlock” situation may occur. 3.3 Data Acquisition System The data acquisition system of this system is composed of load cell, AD7730 analogto-digital converter and NiosIICPU1. Among them, the load cell uses a resistance strain pressure sensor, using elastic sensitive elements and strain gauges to convert the weight of the object into a corresponding voltage signal. This voltage signal is filtered and amplified by the signal conditioning circuit, and the AD7730 is the core. The data acquisition circuit converts the analog signal into a digital signal that can be processed to obtain the required quality value.

Research and Design of FPGA Embedded System

337

4 Experimental Analysis of FPGA Embedded System 4.1 Analysis of System Resource Usage This article uses the external expansion configuration chip EPCS4 to save the corresponding configuration information. Through the way of programming, the.pof file is programmed into the EP2C8 external expansion configuration chip EPCS4 through a special tool. EP2C8. After power on, it reads the configuration information from the configuration chip. In the actual use process, if the application is not very large, it can be directly written into this configuration chip. Table 1 shows the system’s use of various resources on Cyclonell EP2C8Q208C8. Table 1. System resource usage Total LABs

346/524 (67%)

I/O pins

112/154 (77%)

Clock pins

2/8(25%)

M4Ks

17/34 (64%)

Total memory bits

76325/165826 (46%)

Total RAM block bits 10557/165842 (64%)

From the resource usage table, it can be concluded that the system’s LUT analysis for different input numbers shows that 4233 logic function logic units are 2233, 3-input logic function logic units are 1421, and less than 2-input logic function logic units are 532. The number of occupied registers is 2915, accounting for 34% of the total number of registers 8646, of which 69 I/O registers account for 18% of the total number of I/O registers. 344 logic array blocks are used, accounting for 67% of the total; 106 user I/O ports occupy 77% of the total resources; 9-bit embedded multipliers occupy 4 of 36; global clock resources occupy 6 The utilization rate is 75%. The above results fully show that the system makes good use of FPGA EP2C8 resources. Under the above resource occupancy and constraints, the system clock frequency can be up to 65.21 MHz. The above indicators show that there is still much room for improvement in system efficiency, which provides conditions for further research and improvement. 4.2 Sampling and Filtering Experiment Analysis Under laboratory conditions, 20 consecutive experiments were carried out on this system, using composite sampling filtering method, drop compensation method and feedback control method to operate. Due to space limitations, only the measurement results obtained in the first 5 times are given here, as shown in Fig. 1. In the experiment, the average metering time of this system is 5.9 s per bag, which is 32% shorter than that of the current domestic metering system, which is 8.7 s per bag. In this experiment, flour was used as the measurement object. In the initial stage of the experiment, the calibration

338

D. Jiang

Fig. 1. Comparison of measurement data by different methods

system W was 25 kg, and the initial values of e1 and e2 were calibrated to 0.1 and 0, respectively. As shown in Fig. 1, it can be concluded that the error rate is 0.57% when the composite sampling filtering method is used, the error rate is 0.19% using the drop compensation method, and the error rate is reduced to 0.08% using the feedback control method. It can be seen that the feedback control method maintains a good control effect under continuous operation. It realizes the online adjustment of the switching parameters and has obvious advantages in the measurement process. However, for the feedback control, the measurement deviation value at the first operation of the system needs to be used, which results in the improvement of the measurement accuracy at the first operation of the system, which needs to be further studied and improved in the subsequent work.

5 Conclusions This paper completed the system design and development work in the laboratory environment, and verified the system functions. From the final experimental results, it can be seen that good results have been achieved. Although some good design ideas were proposed, a series of problems were still encountered in the actual design process. In the process of using the dual-core structure, it is also found that the EP2C8 development board has only 36 M4K RAM blocks and a maximum of 18K of on-chip memory, but the two processors will occupy a considerable part of it. Performance is affected. Since the feedback control needs to use the measurement deviation value at the first operation of the system, the measurement accuracy at the first operation of the system is not significantly improved. Due to limited time and capacity, this system was only tested under

Research and Design of FPGA Embedded System

339

laboratory conditions. It did not take into account the influence of interference factors such as vibration of the metering sensor, vibration of the material impact force and uncertain air flying materials on the system. These are the shortcomings of the current system, and need to continue to study and improve in the future study and work.

References 1. Gopi, J., Manjula, J.: Efficient NOC architecture for FPGA based soft core embedded system. Int. J. Appl. Eng. Res. 10(7), 17029–17036 (2015) 2. Rajasekaran, C., Jeyabharath, R., Veena, P.: FPGA SoC based multichannel data acquisition system with network control module. Circuits Syst. 08(2), 53–75 (2017) 3. Wu, Y., Kaempf, J.H., Scartezzini, J.L.: Design and validation of a compact embedded photometric device for real-time daylighting computing in office buildings. Building Environ. 148, 309–322 (2019) 4. Li, A., Kumar, A., Ha, Y., et al.: Correlation ratio based volume image registration on GPUs. Microprocess. Microsyst. 39(8), 998–1011 (2015) 5. Cuppini, M., Mucci, C., Franchi, S.E.: Soft-core embedded-FPGA based on multistage switching networks: a quantitative analysis. IEEE Trans. Very Large Scale Integr. Syst. 23(12), 3043–3052 (2015) 6. Perera, D.G., Li, K.F.: A design methodology for mobile and embedded applications on FPGA-based dynamic reconfigurable hardware. Int. J. Embedded Syst. 11(5), 661 (2019) 7. Mcintosh-Smith, S., Price, J., Sessions, R.B., et al.: High performance in silico virtual drug screening on many-core processors. Int. J. High Perform. Comput. Appl. 29(2), 119–134 (2015) 8. Bangqiang, L., Zhoumo, Z., Jing, D.: A new method of fault tolerance based on partial reconfiguration. Int. J. Inf. Commun. Technol. 9(2), 232 (2016) 9. Arena, L., Piergentili, F., Santoni, F.: Design, manufacturing, and ground testing of a controlmoment gyro for agile microsatellites. J. Aerospace Eng. 30(5), 04017039 (2017) 10. Liang, W., Wu, K., Xie, Y., et al.: TDCM: an IP watermarking algorithm based on two dimensional chaotic mapping. Comput. Sci. Inf. Syst. 12(2), 823–841 (2015)

Multi-source Heterogeneous and XBOOST Vehicle Sales Forecasting Model Fan Zhang(B) , Jing Yang, Yaxin Guo, and Hongjian Gu China Automotive Research (Tianjin) Automotive Information Consulting Co., Ltd., Tianjin 300000, China [email protected]

Abstract. With the rapid development of the economy, the automobile industry has developed as the world’s no. 1 automobile consumer market and the world’s largest consumer potential market. The growth of domestic auto production and sales has an obvious driving effect on auto finance. The penetration rate of auto finance has increased from 13% five years ago to nearly 40% now. The purpose of this paper is to optimize the model algorithm based on multi-source heterogeneous and XBOOST vehicle sales prediction model. In this paper, the application of multi-source heterogeneity and XBOOST algorithm to the auto sales prediction model is discussed by using the sample data of auto sales of A Auto company, and the relevant characteristics of customers are studied to establish the logistic regression model of sales prediction and take it as the standard. Finally, the optimal parameter combination is explored to optimize the model effect. Combined with the evaluation index of machine learning classification model, the performance of each model is compared. The results showed that the difference between forecast and actual sales volume was only 12.1%. This is helpful for the enterprise to provide reference for the forecast of car sales. Keywords: Multi-source heterogeneity · Vehicle sales · Machine learning · Logistic regression

1 Introduction With the improvement of the penetration rate of auto finance, the requirements on enterprises’ risk control ability are increasingly high, and relevant enterprises also begin to combine scientific and technological means with risk control [1, 2]. Automobile sales forecasting model is a measure for automobile enterprises to prevent risks and forecast market conditions. It can help improve the company’s ability to identify customers and reduce the losses caused by auto finance business [3]. Since this year, countries have attached greater importance to new energy vehicles. China’s policies to promote the development of new energy vehicles are also constantly introduced. Under the active promotion of relevant national policies, the development of new energy vehicles in China is gradually accelerated. At the beginning of this year, the automobile industry adjustment and revitalization plan principles were adopted, which © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 340–347, 2021. https://doi.org/10.1007/978-3-030-62746-1_50

Multi-source Heterogeneous and XBOOST Vehicle Sales Forecasting Model

341

not only boosted the confidence of the automobile market, but also more reflected the state’s support for the development of energy-saving and new energy vehicles. According to the plan, the central government will allocate 10 billion yuan over the next three years to support technological innovation and upgrading of enterprises and the development of new energy vehicles and spare parts. Promote the industrialization of electric vehicles and their key components. The central finance arranges subsidy funds to support the demonstration and promotion of energy-saving and new-energy vehicles in large and medium-sized cities, and the implementation of this policy will certainly have a significant impact on automobile sales [4]. Sun Huifang proposed a decision method based on core and gray level to solve the multi-attribute decision problem of gray multi-source heterogeneous data, and gave the definition of core density and gray level of extended gray number in gray multi-source heterogeneous data sequence. On this basis, the kernel vector and gray vector of the sequence are constructed to whiten the multi-source heterogeneous information, and a grey relational bidirectional projection sorting method is proposed [5]. In the face of massive terminals, the reasonable allocation of limited resources in the system and the fusion of heterogeneous data has become an important research topic of NB-IOT. Liu Yu proposed a nB-iot multi-source heterogeneous data fusion method based on perceptive semantics. Firstly, the advantages and key technologies of NB-iot are introduced. Liu Yu analyzed the centralized mode and distributed mode in NB-iot networks and proposed a semantic perception-based multi-source heterogeneous data fusion to form a unified format [6]. With the help of expert experience information, interval estimation of failure efficiency data under different methods can be obtained. How to make the interval convergent to the new information is an important problem to be solved. Heng Shao USES the concept of generalized standard grey number to describe the multi-source heterogeneous uncertainty failure rate data as a unified framework. Then, the average failure rate is calculated by engineering construction method, and the grey index distribution reliability function is established [7]. This paper makes use of multi-source heterogeneous algorithm and XBOOST algorithm, combined with the sales situation of automobile companies, analyzes related variables, and provides Suggestions for establishing automobile forecast sales model. Use important feature variables to establish corresponding structure algorithm [8, 9]. Then, it introduces the main parameters of the machine learning algorithm, USES the machine learning library tool to explore the optimal parameter combination, and finally, through experiments, provides technical Suggestions for automobile enterprises [10].

2 Proposed Method 2.1 Multi-source Isomerism In the process of enterprise information management system of construction, due to various business data management system of construction and management of the implementation of the process, data storage and management system and the evolution of technical and other economic and social, and other factors, led to the enterprise in the process of informatization development has accumulated a lot of different business system and data storage and management informatization, including enterprise adopts the

342

F. Zhang et al.

distributed data storage and management system is very different, from simple to complex enterprise file management database network management database, Together, they constitute the heterogeneous data system and data source of the entire enterprise. 2.2 Automobile Sales Forecasting Model Selected history this month sales price index as the dependent variable, explain the variable factors including history of auto sales this month, steel car production, rubber tire car production, monetary supply of consumer goods, network baidu search traffic index, the consumer prices index, etc., assumes that the car sales is not only related to car sales price index for the history of this month, also with the network of steel car production, rubber tire car production, money supply of consumer goods, baidu’s search traffic, consumer goods price index many factors, such as k month before you can get under the car sales data of multi-factor nonlinear autoregressive model is defined as: x(t − k) = [x1 (t − k), x2 (t − k), x3 (t − k), x4 (t − k), x5 (t − k)]

(1)

In the above equation, each factor represents car sales in the first K months, steel production in the first K months, rubber tire production in the first K months, money supply in the first K months, and Internet search index in the first K months. On this basis, assuming that the errors of the base learner are independent of each other, the learning objective of the XBoost algorithm is to find F(t) and minimize the objective (t−1) + ft (xi ) is the predicted result of the ith sample during the function, where yit = yi T th model training:  n  l yi , y(t−1) + ft (xi ) + Ω(ft ) (2) L(t) = i=1

3 Experiments 3.1 Experimental Background In the past two years, the sales growth rate of domestic automobile market has changed from double digit to single digit, which means that blind expansion of production capacity will lead to overcapacity. Due to the capital-intensive, labor-intensive and technologyintensive nature of the automobile industry and its pillar position in the national economy, once there exists the problem of overcapacity in the automobile industry, it will not only cause huge waste of manpower and material resources, but also shake the foundation of the entire national economy. Therefore, the emergence of automobile sales forecasting model is very necessary. 3.2 Experimental Design The data in this paper are from the sales data and indicators of A automotive enterprise over the years. Taking them as sample values, the importance of each feature in the modeling process to the objective function is plotted through plot_Importance module

Multi-source Heterogeneous and XBOOST Vehicle Sales Forecasting Model

343

and Matplotlib module in XBoost. The XBoost algorithm USES the greedy algorithm to segment the training data by recursively selecting the optimal features of the tree structure from the root node. Assuming that IL and IR are the sample sets on the left and right of the segmentation point respectively, I = IL ∪ IR, the information gain of each segmentation scheme is calculated. The segmentation with the maximum information gain is the optimal segmentation of the node. Its model is shown in Eq. (3): yi = φ(xi ) =

k 

fk (xi )

(3)

k=1

Where fk ∈ F and K is the number of CART trees. The XBoost algorithm retains the prediction of the previous T−1 round at each model training, adds a new function F(t) to the model, and then tests the correlation coefficient of the explanatory variables in the model through the model’s multicollinearity test. Finally, Eviews6.0 is used to test the correlation of data. In order to avoid heteroscedasticity of the model, logarithmic transformation is performed on the data. Some experimental results are shown in Table 1. Table 1. Experimental results The number of data MSE Training data

68

R

4.27629e−17 9.99999e−1

Validation data 14

3.07607e−2

5.10501e−1

The test data

6.93728e−2

2.18183e−1

14

4 Discussion 4.1 Analysis Based on Multi-source Heterogeneous and XBOOST Vehicle Sales Prediction Model As shown in Fig. 1, MSE is the mean square error between the predicted sales volume and the actual sales volume. The smaller the MSE, the better the prediction effect. When MSE = 0, the predicted sales volume = the actual sales volume. This is because the amount of sample data is small. Only by increasing the sample size can the accuracy of machine learning prediction be improved. Except for the relatively small correlation coefficient between the fuel price index and other variables, the other correlation coefficients are mostly above 0.7, in which the number of passenger vehicles in service is negatively correlated with other factors. For example: the operation of the passenger car and the energy consumption per capita life negative correlation relationship, that is the operation of the passenger car ownership increases, such as the increase in the number of the bus, so more people can take a bus rather than drive, thus reducing the energy consumption, per capita energy consumption is decreased. Therefore, it shows that there is serious multicollinearity among the above explanatory variables.

344

F. Zhang et al.

Fig. 1. Comparison of predicted sales volume and actual sales volume in the prediction model

In the figure above, A, B, C, D, E and F respectively refer to the main factors affecting China’s car sales: per capita private car ownership, per capita domestic energy consumption, road mileage, operating passenger car ownership, fuel price index and steel production. In the process of building the model, we normalized the data of explanatory variables, so the power index of explanatory variables in the equation cannot be used to judge the degree of influence of a certain factor on automobile sales. The automobile sales forecast model we established contains 6 influencing factors. As long as we know the specific values of these 6 factors and substitute them into the model, we can predict the automobile sales of the corresponding year. This has certain guiding function to the automobile enterprise reasonable formulation production plan. China’s automobile sales and fuel price index show a rising trend with the passage of time. Fuel is the driving force of cars. According to statistics, most buyers consider fuel consumption as the primary factor when buying a car less than 10,000 yuan. So a change in the price of fuel inevitably leads to a change in car sales. After Granger causality test, fuel price index is the Granger cause of automobile sales change. In addition, steel production and car sales are increasing over time. After Granger causality test, steel production is the Granger cause of car sales change. After analysis, the above factors have a certain degree of impact on China’s car sales. After granger causality test, the above factors are all granger causes of automobile sales, that is, changes in the above factors will cause changes in automobile sales. As shown in Fig. 2, it is the comparison of grey correlation coefficients of different factors. It can be known that the gray correlation coefficient of steel price is the largest, that is, the driving force of steel price on automobile sales is the largest. The iron and steel industry is the pillar industry of China’s national economy and an important symbol of the country’s economic level and comprehensive strength. The development of the iron and steel industry directly affects other industries related to it. With the increase of construction and manufacturing demand, China’s steel industry has also developed rapidly. Automobile output directly affects automobile sales. For each additional 10,000 automobiles, it is necessary to increase the use of 98,000 tons of steel. In a sense, the steel output restricts automobile production and thus affects automobile sales. Therefore, steel production should be the biggest factor affecting auto sales. In addition, with the rapid development of China’s economy, automobile enterprises have also developed. More and more people will buy cars, so that the number of cars will continue to increase,

Multi-source Heterogeneous and XBOOST Vehicle Sales Forecasting Model

345

forcing the construction of roads to increase. Especially in some big cities, the urban traffic environment hinders the sales of cars to a great extent. The third driving force is per capita energy consumption, which is an important indicator to measure a country’s energy consumption level. Although China is a world energy consumer, its per capita consumption is only 62% of the world level due to its large population. Normal use of cars requires energy consumption, so as per capita energy consumption increases, so does vehicle sales. The fourth driving force is owner-occupied passenger vehicles, which are used as “replacement supplements” for passenger vehicles. An increase in the number of passenger cars will make public transportation more convenient and consumer prices lower, which will reduce consumer demand for passenger cars and affect sales.

Fig. 2. Comparison of grey correlation coefficients of different factors

Drivers of both the per capita and fuel price indices came in second, suggesting that the impact of these two factors on car sales was less pronounced. With the development of economy, fuel is no longer an important factor hindering automobile consumption. The driving force ranks last is the average price of the automobile market. In fact, it can be observed from the original data that the average price of the automobile market has been on a downward trend for ten years. With the progress of science and technology, the cost of the automobile industry has been reduced, so the price has also been reduced. The price of a car, though a consideration when buying a car, is no longer the dominant factor. As the sample data size is slightly larger, the calculation speed will be affected by the algorithm. Experiments show that the prediction accuracy of XBoost algorithm reaches the maximum when the number of iterations is 1000, and the modeling process takes about 9 s on average. After the integration of XBoost algorithm, the prediction accuracy reaches the maximum when the number of iterations is 500, and the modeling process takes about 50 s. When the number of decision trees is 500, the prediction accuracy reaches the maximum, and the modeling process takes about 120 s on average. The XBoost algorithm and its integration are significantly faster than other algorithms. To sum up, the user score prediction model based on XBoost algorithm has high prediction accuracy and computing efficiency.

346

F. Zhang et al.

4.2 Recommendations Based on Multi-source Heterogeneous and XBOOST Vehicle Sales Forecasting Model From the perspective of national policies, the importance and support given by the state to the development of new energy vehicles have a great incentive and guiding role for enterprises. Especially in the initial stage of new energy technology, state support is very important. Many enterprises have regarded new energy vehicle technology as one of the important basis points for future “profit enterprises”. The full text of the Auto Industry Adjustment and Revitalization Plan has been released, which puts forward a clear direction for the development of China’s automobiles: namely, the production and marketing scale of electric vehicles. We will transform existing production capacity to produce 500,000 new energy vehicles, including pure electric, plug-in hybrid, and ordinary hybrid electric vehicles. Sales of new energy vehicles account for about 5% of total passenger vehicle sales. The main passenger vehicle production enterprises shall have new energy vehicle products that have passed the certification. In order to ensure the ultimate realization of this goal, enterprises need to comb and adjust their new energy vehicle strategies. The industrial process of China’s new energy vehicles has just entered the climbing stage, and the Plan undoubtedly depicts a future technology roadmap for China’s automobile industry. For the research of automobile sales forecast, the traditional time series analysis model is mostly established at present. They have two shortcomings: they only use the historical sales data to solve the problem of automobile sales forecasting. In fact, there are many factors affecting automobile sales forecasting, such as raw material factors, consumer factors, network communication factors and macroeconomic factors. It should be assumed that there is a linear relationship between historical sales and sales. In fact, there is a highly non-linear relationship between sales and historical sales and other influencing factors. The key of integrated learning is how to generate good and different individual learners. The higher the accuracy and diversity of individual learners are, the better the integration effect will be. Compared with LR, NB and other stable classification models, tree model is an unstable classification model which is sensitive to sample disturbance. Decision tree is often used as an individual learner of integrated learning because of its simplicity and intuition and strong interpretability. Compared with ID3 and C4.5, CART USES binary recursive partition to construct a binary tree, and the split feature can be used repeatedly, both for classification and regression. Based on the advantages of integrated learning, a score prediction model was established by using XBoost algorithm based on CART tree as the learner at the bottom of the model. At the same time, in order to increase the diversity of individual learners in integrated learning and improve the generalization ability of the model, data sample perturbations and attribute perturbations are added at the top level with Bagging idea to build multiple good and different XBoost models. In this paper, the algorithm model is improved on the basis of the traditional algorithm. At the bottom of the model, XBoost algorithm based on CART tree is used to build the scoring prediction model. At the same time, in order to increase the diversity of the integrated study of individual learning, improve the generalization ability of the

Multi-source Heterogeneous and XBOOST Vehicle Sales Forecasting Model

347

model, on the top floor by Bagging thought to join the data sample disturbance, disturbance and properties to create a more good and different XBoost model, and USES the ballot for model integration, for a binary classification task, category marker for {y0 , y1 }, set down the sample x on XBoost model to predict the output is expressed as a   two-dimensional vector φn0 (x), φn1 (x) , is on the sample x, by integrated forecast model N XBoost, predicted results can be expressed as the formula: 

y(x) = y

arg max j∈{0,1}

N 

j

φn (x)

(4)

n=1

5 Conclusions This paper makes a preliminary study on the automobile sales forecast of multi-source heterogeneous and XBOOST. This paper makes a brief introduction to some forecasting theories at present, and analyzes the main factors affecting the growth of automobile sales in China. As these factors are constantly changing, automobile sales are also changing accordingly. Then, the correlation between these factors and auto sales is tested, and the existing auto sales forecasting model is optimized.

References 1. Wang Feng, H., Liang, Z.J., et al.: A semantics-based approach to multi-source heterogeneous information fusion in the Internet of Things. Soft. Comput. 21(8), 2005–2013 (2017) 2. Heng, S., Zhigeng, F., Qin, Z., et al.: Research on an exponential distribution reliability function model based on multi-source heterogeneous data supplements. Grey Syst. Theo. Appl. 7(3), 329–342 (2017) 3. Gupta, C., Jain, A., Joshi, N.: DE-ForABSA: a novel approach to forecast automobiles sales using aspect based sentiment analysis and differential evolution. Int. J. Inf. Retrieval Res. 9(1), 33–49 (2019) 4. Junjie, G., Yanan, X., Xiaomin, C., et al.: Chinese automobile sales forecasting using economic indicators and typical domestic brand automobile sales data: a method based on econometric model. Adv. Mech. Eng. 10(2), 168781401774932 (2018) 5. Sun, H., Dang, Y., Mao, W.: A decision-making method with grey multi-source heterogeneous data and its application in green supplier selection. Int. J. Environ. Res. Public Health 15(3), 446 (2018) 6. Liu, Yu.: Multi-source heterogeneous data fusion based on perceptual semantics in narrowband Internet of Things. Pers. Ubiquit. Comput. 23(3–4), 413–420 (2019) 7. Heng, S., Zhigeng, F., Qin, Z., et al.: Research on an exponential distribution reliability function model based on multi-source heterogeneous data supplements. Grey Syst. Theo. Appl. 7(3), 329–342 (2017) 8. Netisopakul, P., Leenawong, C.: Multiple linear regression using gradient descent: a case study on Thailand car sales. J. Comput. Theoret. Nanosci. 23(6), 5195–5198 (2017) 9. Yang, L., Qi, Z., Zhiping, F., et al.: Maintenance spare parts demand forecasting for automobile 4S shop considering weather data. IEEE Trans. Fuzzy Syst. 27(5), 943–955 (2019) 10. Kim, N., Park, Y., Lee, D.: Differences in consumer intention to use on-demand automobilerelated services in accordance with the degree of face-to-face interactions. Technol. Forecast. Soc. Chang. 139, 277–286 (2019)

The Lorentz Component Algorithm for Calculating the Center of the Circular Motion of Charged Particles Chaoyue Jin(B) School of Ocean Science and Technology, Panjin City 124000, Liaoning Province, China [email protected]

Abstract. When the moving point charge enters the magnetic field, it will move in a uniform circular motion without external force. The traditional calculation method can obtain the moving radius and the center position of the circular motion of the moving point charge in the magnetic field according to the charged quantity q of the moving point charge, its own mass m, the moving speed v and the magnetic induction intensity B of the magnetic field. In order to express the accurate position of the center of the circle intuitively and realize the computer programming, a method of using the Lorentz force component formula to orthogonally decompose the speed and calculate separately is proposed here, and the straight line and parameter conditions are determined by the Lorentz formula and the left-hand rule, And finally determine the accurate position of the center of the circle through the intersection of two straight lines. Keywords: Center of circle solution · Lorentz force component formula · Lorentz force · Electric charge movement

Physics is divided into many different fields. Electromagnetism is an important field of physics. There are applications of electromagnetic theory everywhere in our lives. Electromagnetics mainly involves the two most basic forces: Ampere force and Lorentz force [1]. Among them, the Lorentz force is the force of the magnetic field on the moving charge, which is more abstract [2], and if the moving point charge is only affected by the Lorentz force, the moving point charge will make a uniform circular motion [3]. It is relatively difficult and complicated to use the Lorentz formula to calculate the radius of motion and then use the left-hand rule to determine the position of the center of the circle in the two-dimensional coordinate system. It is relatively difficult and complicated. This also brings a lot of problems to the computer programming software to analyze the movement process of the point charge inconvenient. An algorithm that uses the Lorentz force component formula to determine the coordinates of the center of the circle is proposed below.

1 Algorithm Overview In 1892, when Dutch physicist Hendrik Antoon Lorentz (1853–1928) established the classical electron theory, as a basic assumption, he gave a formula for the force of a © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 348–353, 2021. https://doi.org/10.1007/978-3-030-62746-1_51

The Lorentz Component Algorithm

349

magnetic field on moving charged particles  [4] F = qv × B

(1)

Among them, the direction of the vector difference product can be judged by the lefthand rule. Now we expand the componentization algorithm based on this basic formula (essentially the component formula of the particle momentum theorem) [5]. 1.1 Parameter Setting Setting the parameters, assuming that the charge of the moving point is q, its own mass is m, the movement speed is v, and the location is (x, y); the magnetic induction intensity of the magnetic field is B. 1.2 Algorithm Description First, the orthogonal decomposition along the coordinate axis is obtained vx and vy .

Fig. 1. Schematic diagram of algorithm principle

Among 

vx = v cos θ vy = v sin θ

(2)

Apply the Lorentz formula and the left-hand rule to the two velocity components, cos θ sin θ cos θ and draw a straight line y = y ± mvqB . Straight line (x − mvqB , y + mvqB ). The or-symbol is determined by the direction of point charge movement and the direction of the magnetic field), as shown in Fig. 1 at the intersection of two straight mvcosθ lines (x ± mvsinθ qB , y ± qB ). It is the center of the circle movement made by the moving point charge O.

350

C. Jin

2 Algorithm Proof Suppose the velocity of the point charge and the direction of the magnetic field are shown in Fig. 1. 2.1 Two-Line Algorithm

Fig. 2. Schematic diagram of the base line of the circle center

During this movement, the charged particles are, y Sub-velocity in direction vy Produce edge x Lorentz force of direction fx in x Sub-velocity in direction vx Producing edge y Lorentz force of direction fy [6], Positive cause fx and fy The existence of these two centripetal forces can determine that the center of the circle is x and y The corresponding distance between the direction and the charge of the moving point is the source of the two straight lines. First of all v Obtained after orthogonal decomposition vx , According to the formula: qBx = m · vy [7] Available: Ry =

mvx qB

(3)

determine with x The distance between the parallel axis and

cos θ Then use the left-hand rule to determine the specific the point charge is Ry = mvqB orientation of the line, and finally add the original coordinates of the point charge to cos θ The same goes for vy Perform the same get the line shown in Fig. 2. y = y + mvqB calculation and the left-hand rule to determine the straight line shown in Fig. 3. x = sin θ The intersection of two straight lines is the center of the circle O coordinate: x − mvqB

(x −

mv sin θ qB ,

y+

mv cos θ qB ).

2.2 Verification of the Accuracy of the Obtained Circle Center Position The trajectory of a charged particle in a magnetic field has three elements, namely the center, the radius, and the central angle [8]. Therefore, the accuracy of the center position must be verified, otherwise the trajectory of the charged particle cannot be

The Lorentz Component Algorithm

351

Fig. 3. Schematic diagram of the base line of the circle center

accurately analyzed. According to the characteristics of uniform circular motion and the characteristic that Lorentz force acts as the centripetal force, the conditions that must be met for the position of the center of the circle obtained are: ➀ The distance between the center of the circle and the point charge is the radius of the particle’s circular orbit: R = mv qB [9]. ➁ The line between the center of the circle and the point charge is perpendicular to the direction of velocity. ➂ Satisfy the direction judgment of the left-hand rule. 2.2.1 Radius Verification According to the distance formula between two points:  s = (x1 − x2 )2 + (y1 − y2 )2 Getting some x −

mv sin θ qB ,

y+

mv cos θ qB

with points (x, y) The distance between is:

 R=

(4)

mv sin θ mv cos θ − x2 + y + − y2 = x− qB qB

 

   mv sin θ 2 mv cos θ 2 mv + = qB qB qB

So it is proved. 2.2.2 Orientation Verification The geometric relationship is shown in Fig. 4. Needs to be verified that the line between the center of the circle and the point charge is perpendicular to the direction of velocity, that is β = π2 . According to the geometric relationship: cosα =

mvsinθ qB

s

=

mvsinθ qB mv qB

= sinθ

352

C. Jin

Fig. 4. Schematic diagram of geometric relationship

From this we can see α and θ Mutual redundancy, namely: α+θ = Getting β = π − (α + θ ) = π −

π 2

=

π 2

π 2

(5)

so it is proved.

2.3 Left-Hand Rule Verification

Fig. 5. Schematic diagram of the left-hand rule

It is verified by using the left-hand rule as shown in Fig. 5 that the magnetic field lines penetrate the palm of the hand perpendicularly, the four straight fingers point to the direction of the charge movement, and the thumb points to the center of the circle [10], the result is consistent with the position of the center of the circle obtained by the algorithm. All three conditions are verified, which proves that the center position calculated by this algorithm has absolute accuracy.

The Lorentz Component Algorithm

353

3 Summary The Lorentz component is used to solve the center of the charged particle in a uniform circular motion in the magnetic field. By orthogonally decomposing the speed of the charged particle in the magnetic field according to the coordinate axis direction, the accurate position of the center is obtained by combining the Lorentz formula and the left-hand rule Coordinates greatly simplify the expression of the center of the circle in the two-dimensional coordinate system, and make it easier to realize the idea of applying computer programming to analyze the point charge movement process in the future.

References 1. Kai, J.: Discuss the ampere force and Lorentz force from the perspective of energy conservation. Sci. Consult. 12, 45–68 (2019) 2. Su, Y., Cao, Y., Zhang, Y.: Use the Lorentz force demonstrator to explore the movement of charged particles in electric and magnetic fields. Phys. Exp. 9, 89–96 (2019) 3. Chen, J., Cheng, J.: Explore the method of solving the problem of charged particles moving in a magnetic field. Phys. Bull. 4, 24–36 (2018) 4. Chen, B., Wang, J., Zhang, R.: How is the Lorentz force formula given? Univ. Phys. 8, 89–97 (2008) 5. Chen, G.: Using the inference of Lorentz force component to solve physics problems cleverly. Phys. Teach. 6, 112–125 (2010) 6. Cui, Y., Ma, C.: Using the Lorentz force component to solve the 2018 national volume finale problem. Chin. Phys. (High Sch. Ed.) 12, 156–167 (2018) 7. Cui, Y., Ma, C.: Using the Lorentz force component to solve the 2018 national volume finale problem. Chin. Phys. (High Sch. Ed.) 12, 178–183 (2018) 8. Yang, X.: The basic model of charged particles moving in a magnetic field. Phys. Teach. 4, 64–75(2019) 9. Su, J.: The movement of charged particles. J. Xuzhou Educ. Inst. 3, 145–158 (2008) 10. Li, C.: Left-hand rule, right-hand rule and right-hand spiral rule. J. Jingmen Vocat. Tech. Coll. 3, 49–56 (2000)

Controller Design Based on LQR for Rotational Inverted Pendulum Dong Wang1(B) , Xinjun Wang2 , and Liang Zhang1 1 Bohai University, Jinzhou 121013, Liaoning, China

[email protected] 2 School of Information Science and Engineering, Shandong Normal University,

Jinan 250014, China

Abstract. The rotational inverted pendulum is an unstable system with multiple variables. This study achieve the stability control of rotational inverted pendulum based on the LQR optimal control method. According to Lagrange dynamics equation modeling rotating pendulum. The paper makes a study of the weighted matrix Q and R. Designed controller and simulation according to the mathematical model by the Matlab. Results show the LQR method can achieve the stable control of rotational inverted pendulum. Keywords: Rotational inverted pendulum · LQR · Optimal control

1 Introduction Inverted pendulum is a typical nonlinear and unstable system, it is an effective platform for testing control method, which has been considered by many researchers most of which have used linearization theory in their control schemes [2]. Because the inverted pendulum is a typical nonlinear, it is a difficult assignment to control with classical methods. Inverted pendulum has two degrees of freedom and only one control input. At present, most of the research on inverted pendulum is straight line, due to the impact of mechanical structure, influenced the control effect [3, 4]. While the rotary inverted pendulum is not limited by space, which put forward higher requirements on control algorithm. The control method has a wide in some areas. Currently inverted pendulum control methods are mainly PID control, State feedback controller optimal control, Adaptive neural network system, Fuzzy Control and so on [1, 10]. Most of these methods are used to a straight line as the research object, while the rotary inverted pendulum has little research [5]. In this paper, the LQR optimal control method achieves a stable control based on rotational inverted pendulum. In the hardware structure, it reduced the intermediate transmission mechanism, with greater nonlinear, instability and complexity. The state equations of the system shown in (1). X˙ = Bu + Ax. © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 354–359, 2021. https://doi.org/10.1007/978-3-030-62746-1_52

(1)

Controller Design Based on LQR for Rotational Inverted Pendulum

u(t) = −Kx(t)

Fig. 1. System model

355

(2)

Fig. 2. Analysis of the balance position

Controlled quantity, shown in (2). Through the LQR function of the MATLAB got the best control matrix K, to minimize the performance index function. Compared with other control method, the method has the advantages of a small overshoot and the fast response speed, can realize the stable control of rotary inverted pendulum and finally it can get a good result.

2 Build a Mathematical Model to System In order to realize the control of the inverted pendulum, building the system model, shown in Fig. 1, m is the mass of the pendulum, L is the pendulum rod to hinge centroid distance, R is the length of the rotary arm, α is the pendulum rod relative to the vertical direction of the zero angular displacement, θ is the angular displacement of rotating arm relative to the horizontal zero. Based on the Lagrange equation, shown in (3). Where q is the generalized coordinates of the system, H is Lagrangian, V is the potential energy of system, T is the kinetic energy of system. In this system, i = 1, 2, q = {θ, α} . Obtained the following equation shown in (4) [4]. H (q, q˙ ) = −V (q, q˙ ) + T (q, q˙ )

(3)

Simplification and established the nonlinear equation of rotary inverted pendulum, shown in (5). Where Toutput is the output torque of the DC servo motor.  . ∂ ∂H. ∂H ∂t ( ∂ θ ) − ∂θ = Toutput − Beq θ (4) ∂ ∂H. ∂H ∂t ( ∂ α ) − ∂α = 0 ⎧ .. . . ⎨ (J 1 + mr 2 ) θ +mlr[sin α(α) − cos α(α)] = Toutput − Beq (5) ⎩ 4 mL2 α.. +mLr sin α(θ. ) − mLr cos α(θ..) − mgL sin α = 0 3

356

D. Wang et al. .

Where Toutput = ηm ηg Kt Kg (Vm − Kg Km θ )/Rm , Selecting θ, θ˙ , α, α˙ for state variables, considering the inverted pendulum in the initial position, α, θ 0, Q ≥ 0. If the system is out of balance, choosing appropriate controls U ∗ in order to make the system back to the state of equilibrium and made J to a minimum.U ∗ is called optimal control. Based on the optimal control theory, the optimal control is as follows. U ∗ = −R−1 BT PX = −KX

(10)

Controller Design Based on LQR for Rotational Inverted Pendulum

357

Where K is the gain matrix,P is the solution of the equation, then solving the algebraic Riccati equation PA − PBR−1 BT P + AT P + Q = 0

(11)

K = R−1 BT P = [k1 , k2 , k3 , k4 ]T

(12)

Based on the modern control theory, optimal control is U = −Kx, making the ∞ quadratic performance index of system J = 0.5 ∗ 0 (U T RU + X T QX )dt the minimum. The mechanical parameters of the inverted pendulum device values here shown in Table 1. Table 1. The system physical parameters table Symbol

Physical significance

Numerical and unit

L

The pendulum rod to the shaft center distance/m

0.165

M

The swing rod quality/kg

0.105

R

The length of the rotary arm/m

0.175

J1

Moment of inertia of rotating arm/kg · m2

2.0 × 10−3

J2

Moment of inertia between the pendulum and center of

9.53 × 10−4

mass/kg · m2 g

Acceleration of gravity/m · s−1

9.8

Kt

Motor torque coefficient/N · m · A−1

7.767 × 10=3

Symbol

Physical significance

Numerical and unit

Km

Reverse potential coefficient/V · s · rad −1

7.767 × 10=3

Kg

Transmission gear ratio

5:1

Rm

DC motor armature resistance/Ω

2.6

ηm

DC motor efficiency/%

69

ηg

Transmission efficiency/%

90

Beq

Viscous damping coefficient/N · ms · rad −1

4.0 × 10−3

Putting the mechanical parameters shown as Table 1 into the system state equation. ⎡ ˙⎤ ⎡ ⎤ ⎤⎡ θ ⎤ ⎡ θ 0 0 1 0 0 ⎢ θ˙ ⎥ ⎢ ⎢ θ¨ ⎥ ⎢ 1.5666 ⎥ ⎥ ⎢ ⎥ ⎢ 0 −1.4886 48.1672 0 ⎥ ⎥Vm ⎥⎢ ⎢ ⎥+⎢ ⎢ ⎥=⎣ ⎣ ⎦ 0 ⎦ 0 0 0 1 ⎣ α⎦ ⎣ α˙ ⎦ 1.2462 0 −1.1841 82.8603 0 α˙ α¨

(13)

In order to obtain the control matrix K, selecting the appropriate weighting matrix Q and R, the purpose is to balance the sensitivity of the system between output and input.

358

D. Wang et al.

Choose Q = [2.3 0 0 0; 0 4.5 0 0; 0 0 1.5 0; 0 0 0 0.5]; R = 1. According to LOR optimal regulator theory, calling the statement that the MATLAB provided: [K,S,E] = lqr(A,B,Q,R,N), then obtained control matrix K.K = [−1.5166 −4.3114 175.3191 21.1769]. The eigenvalues of the system is a1 = −10.3165, a2 = −8.3517, a3 = − 0.6990, a4 = −1.7572. From the eigenvalues of the system could draw a conclusion that system can achieve the stable at equili- brium point [7].

Fig. 3. Simulation model of Simulink system structure diagram

4 System Simulation First simulation in the Matlab simulink environment, establishing the model shown in Fig. 3. Getting the response curve of the system simulation. Pendulum rod angle and angular velocity curve is shown in Fig. 4. Arm angle and angular velocity curve is shown in Fig. 5.

Fig. 4. Pendulum rod angle and angular velocity curve

Fig. 5. Arm angle and angular velocity curve

It can be seen from Fig. 4 that the pendulum angle is not greater than 0.4 rad , and tended to 0 in the 5 s, finally stabled at the equilibrium state. It can be seen from Fig. 4 that the maximum angle of rotating arm is no more than 1 rad , finally tended to 0. The control system has good control effect and achieves the expected goal. After many simulation experiments, the inverted pendulum can be stabilized in the equilibrium state, On the one hand, the overshoot of pendulum angle is very small, and it has fast response speed. On the other hand, the inverted pendulum with a little error and could achieve the optimal control.

Controller Design Based on LQR for Rotational Inverted Pendulum

359

5 Conclusions First, modeling for the rotational inverted pendulum by Lagrange equation, achieved the stable control of the inverted pendulum with the LQR method. By the Matlab simulation curve could seen the system with quick respondence, the control effect is satisfactory. The method is simple in principle, could realize the stable control of rotational inverted pendulum. The method is to lay the groundwork for future research. Acknowledgements. This work was supported by Liaoning Natural Science Foundation under Grant No. 20180550189 and No. 2019-ZD-0491

References 1. Zhao, X., Zhang, L., Shi, P., Karimi, H.R.: Novel stability criteria for T-S fuzzy systems. IEEE Trans. Fuzzy Syst. 21(6), 1–11 (2013) 2. Bugeja, M.: Non-linear swing-up and stabilizing control of an inverted pendulum system, In: EUROCON Ljubljana, Slovenia (2003) 3. Craig, K., Awtar, S.: Inverted pendulum systems: rotary and arm-driven a mechatronic system design case study. Mechatronics 12, 357–370 (2001) 4. Shiriaev, A.S., Friesel, A., Perram, J., Pogromsky, A.: On stabilization of rotational modes of an invertedpendulum. In: Proceedings of the 39th IEEE Conference on Decision and Control, Sydney, NSW Australia, vol. 12, no. 5, pp. 5047–5052 (2000) 5. Krishen, J., Becerra, V.M.: Efficient fuzzy control of a rotary inverted pendulum based on LQR mapping. In: IEEE International Symposium on Intelligent Control, Germany, pp. 2701–2706 (2006) 6. Mrad, F., El-Hassan, N., Mahmoud, S.E.H., Alawieh, B., Adlouni, F.: Real-time control of free-standing cart-mounted inverted pendulum using LabVIEW RT. In: Conference Record of the 2000 IEEE Industry Applications Conference, Rome, Italy, vol. 10, no. 2, pp. 1291–1298 (2000) 7. Park, J.I., Lee, S.G.: Synthesis of control inputs for simultaneous control of angle and position of inverted pendulum. In: Proceedings of 1996 4th International Workshop on Advanced Motion Control, Mie, Japan, vol. 3, no. 2, pp. 619–624 (1996) 8. Rotary Inverted Pendulum User Guides & Laboratories. Quanser Inc. (2003) 9. Ang, K.H., Chong, G., Li, Y.: LQR control system analysis, design, and technology. IEEE Trans. Control Syst. Technol. 13(4), 559–576 (2005) 10. Du, G., Huang, N., Wu, G.: The rotational inverted-pendulum based on DSP controller. In: Proceedings of the 4th World Congress on Intelligent Control and Automation, Shanghai, China, vol. 7, no. 4, pp. 3101–3105 (2002)

Three-Dimensional Scenic Spot Roaming System Based on Virtual Reality Technology Yujuan Yan1(B) , Shuo Wang1 , Jialin Li2 , and Suyang Li1 1 Jilin Engineering Normal University, Changchun, Jilin, China

[email protected] 2 Changchun Institute of Land Surveying and Mapping, Changchun, Jilin, China

Abstract. With the development of human civilization and the progress of society, some intelligent technologies such as computer software technology and electronic information technology are gradually improved. Data virtual technology has become a new development direction. In this context, virtual reality technology came into being. In this era of rapid economic development, tourism has become a way of life accepted and practiced by people. Therefore, in this information age, many scenic spots began to use the Internet to promote scenic spots, and the research of three-dimensional scenic spot roaming system based on virtual reality technology has started. In this paper, through the method of virtual reality modeling and roaming, combined with the specific situation of the scenic spot, the three-dimensional roaming model of the scenic spot is established, and the real-time three-dimensional roaming of multiple scenes and the humanized design of the system are realized. In the previous research, we found that virtual and augmented reality technology can directly use computer technology to generate a more realistic three-dimensional roaming environment of human-computer simulation, which makes users completely immersed in the virtual environment. The direct interaction between users and virtual environment has been realized through the virtual human-computer interaction interface. Through data analysis, it can be found that the overall success rate of transaction completion and successful transaction reaches 100%. Keywords: Computer technology · Virtual reality · Three-dimensional scenic spots · Odyssey system

1 Introduction Virtual reality [1, 2] system is a computer system based on virtual reality technology, which generates virtual three-dimensional scene through computer software and its external equipment. Through the interaction and feedback of visual, auditory, tactile and other senses, everyone can feel the feeling of being in the scene. At present, virtual augmented reality technology has been widely used in military, entertainment, architecture, geology, medicine, geographic information system and other fields and industries with its unique technical advantages. At present, virtual augmented reality technology © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 360–366, 2021. https://doi.org/10.1007/978-3-030-62746-1_53

Three-Dimensional Scenic Spot Roaming System

361

is widely used in modern computer graphics, multimedia electronic information technology, artificial intelligence [3–5] technology and other research and application fields, further promoting the development of computer vision simulation technology. How to reproduce the real world information more intuitively is the purpose of virtual reality technology and visual simulation technology. Since the 21st century, with the continuous improvement of modern computer and software technology [6], E-commerce Internet technology, virtualization and reality Internet technology, database management technology and network software and hardware automation technology, etc., it has laid a solid technical foundation for the security and sustainable development of China’s digital tourism. Digital tourism and digital earth technology are reflected in the development of Digital Tourism in China. Digital tourism technology is based on three-dimensional simulation technology and network technology, which makes the display of scenic spots or landscapes more vivid, vivid and intuitive. It also has search function, and can make full use of video, panoramic pictures, virtual reality technology and other means to provide tourists with comprehensive tourism information services, such as food, accommodation, transportation, tourism, shopping and entertainment, so as to comprehensively improve the service quality and improve the internationalization level and core competitiveness of Tourism. This paper starts with the theme of the development of the times, because under the background of the information age, any industry must follow the pace of the development of the times and improve its core competitiveness, because in this era of rapid development, a small outdated problem may be eliminated. Based on virtual reality technology, the 3D roaming system of scenic spot is studied. In this paper, through the modeling and roaming method of virtual reality technology, combined with the specific situation of the scenic spot, the three-dimensional model of the scenic spot is established, and the real-time scene roaming system is designed. In this way, users can better interact with the virtual environment.

2 Related Technologies of 3D Scenic Spot Roaming System Virtual reality technology is an advanced computer user interface. It provides virtual reality users with a way and means to simultaneously help users realize various intuitive and natural computer real-time visual and perceptual interaction, such as watching, listening, touching, etc., so as to maximize convenience and help users improve the speed and convenience of system operation on the computer, Thus, it greatly reduces the psychological pressure and economic burden of the system users, and improves the network security and work efficiency of the whole system. According to the different application objects between system virtual and reality, the functions of virtual reality can be expressed in different forms, such as designing or conceiving a certain concept. 2.1 Image Feature Point Extraction and Matching Technology Accurate extraction of image feature points is the basis of camera calibration, image matching, image retrieval and 3D reconstruction. Therefore, image feature point extraction technology has been a hot research topic in computer image processing and computer vision.

362

Y. Yan et al.

In order to make the space of feature points have good scale invariance, scale space is introduced. The theory of scale space was first put forward by Witkin in 1983. It is a Gaussian function space which scales the original image with different feature points G(x, y, σ) a mathematical analysis method to map the feature points of original image to scale space by convolution operation. Small scale transform theory of feature points can accurately show the overall details and local features of the original image, while large scale transformation theory can well describe the overall overview and characteristics of the original image. Koendetink proved that Gaussian convolution kernel is the only convolution kernel which can realize the only scale transformation of Gaussian scale linear transformation, and Lindeberg further proved that Gaussian kernel is the only Gaussian linear convolution kernel. The scale space of a two-dimensional gray image is defined by formula (1): L(x, y, σ) = G(x, y, σ) ∗ I(x, y)

(1)

1 −(x2 +y2 )/2σ 2 e 2π σ 2

(2)

G(x, y, σ) =

G(x, y, σ) It’s a scale variable Gaussian function, I(x, y) it is the grayscale image of the original image, symbol ∗ represents convolution operation, (x,y) represents the position of pixels in the image, σ is the scale space factor. σ the smaller the value is, the smaller the corresponding scale is, the more image details are retained. Along with σ gradually, the image is smoothed more and more, leaving only the general picture of the image. 2.2 Virtual Reality Roaming Based on Geometric Model Virtual reality roaming based on geometric modeling is the basic drawing principle of computer graphics. First of all, we need to digitize and abstract simulate the 3D scene, build it in the virtual 3D landscape model structure (usually including building site, natural landscape effect, etc.), and set the 3D model of material information. Then, according to the requirements of on-site display, in order to achieve a more realistic sensory effect, texture mapping technology usually needs to improve the appearance of the system model. Finally, by setting the control parameter set required for rendering the scene, the observer’s position information is obtained through the interactive controller, and the lighting parameters of the system position are rendered to the output device in real time to complete the walkthrough of the whole scene.

3 Experimental Background and Design 3.1 Experimental Background Accurate extraction of image feature points is the basis of camera calibration, image matching, image retrieval and 3D reconstruction. Therefore, image feature point extraction technology has been a hot research topic in computer image processing and computer vision. Image feature points refer to the points with obvious features in the image. It

Three-Dimensional Scenic Spot Roaming System

363

is usually different from neighborhood points in such attributes as brightness, color, curvature or texture. For example: corner point, line intersection point, discontinuity point, maximum curvature point on contour line, etc. Feature point extraction technology is to detect and describe the points different from neighborhood points in image. The selected feature points should be obvious, easy to extract and have enough distribution in the image. In order to uniquely identify each feature point and the subsequent feature point matching module, a small neighborhood of the feature point is usually selected as the center point, and the description vector of the feature point is generated according to a certain measurement method. 3.2 Experimental Design In order to find a general feature point extraction algorithm, this experiment will compare SIFT algorithm and surf algorithm from three aspects: the number of feature points extracted by the algorithm, the time required by the algorithm, and the number of correct matching point pairs. The comparison of sift and surf detection feature points is shown in Table 1. The number of feature points extracted from each graph, the time spent and the number of correct matching point pairs are recorded in Table 1. In order to make the data comparable, the same feature point matching algorithm is used to match the feature points extracted by SIFT and surf. From the data in Table 1, compared with surf algorithm, SIFT algorithm can extract more feature points and correctly match point pairs, but it takes a long time. Compared with SIFT algorithm, surf runs faster than SIFT algorithm. In the case of better image quality, the number of effective feature points detected can meet the requirements of estimating model parameters in the process of panorama generation. Therefore, surf can be used as a feature point detection method. Table 1. Comparison of sift and surf performance SIFT

SURF

Number of characteristic points (piece)

Time required (seconds)

Match point pairs correctly (yes)

Number of characteristic points (piece)

Time required (seconds)

Match point pairs correctly (yes)

119

264

0.121

65

295

0.234

59

164

0.414

135

0.144

91

0.103

116

0.156

Group 1

(a)

599

1.654

(b)

487

0.965

Group 2

(a)

712

1.414

(b)

469

0.885

Group 3

(a)

255

0.654

(b)

295

0.986

15

36 3

364

Y. Yan et al.

4 Discussion 4.1 System Testing This paper briefly introduces and demonstrates the function test of some modules of the system. The purpose of testing is to find out the potential errors and defects of the system, and quickly correct the errors and defects, so as to improve the life cycle and quality of the system, and avoid the potential defects caused by various risks. In this test, the actual business scenario is simulated by continuous pressurization. The purpose of this report is to describe the maximum number of users that the server can support in this test, and to show the response time and server resource usage in this case. This test is based on a high concurrency connection, and the number of virtual users is 6000. Use the pressure mode to set the execution frequency of all users for 3 h. The system is equipped with optical fiber network and better server hardware equipment. After testing, the roaming system can support more than 6000 concurrent connections, and the e-commerce network can support more than 6000 concurrent connections. The overall success rate of completed transactions and successful transactions obtained from system logging is 100%. When the roaming system is concurrent with 6000 users, the average reading time of a single scene is about 8 s; when the roaming system is concurrent with 4000 users, the average reading time of a single scene is about 6 s; when the roaming system is concurrent with 2000 users, the average reading time of a single scene is about 2 s. The specific test situation is shown in Fig. 1. 15

time(s)

10 5 0 6000 Response time of single scene

4000 number of users

Response time of irregular jump

2000 Multiple users stay in the same scene Response time

Fig. 1. Concurrent response time of roaming system

In the 3D panoramic roaming system, each scenic spot has its own commentary dubbing. Under the effect of 3D display of real scene, audio interpretation brings users a new display mode, which makes users feel immersive. Visitors can freely shuttle around any scenic spot by operating the mouse to realize real-time scene, move the real scene to users, and fully display the environmental conditions of the scenic spot. Three dimensional panoramic technologies based on multimedia image, audio and programming language can easily show the scenic spot in front of tourists, which is the most powerful weapon for tourism promotion and promotion. After 3 h of stress testing, the CPU utilization is in the ideal value, and the available memory is within the normal threshold. The details are shown in Fig. 2.

Three-Dimensional Scenic Spot Roaming System

365

70 60

CPU usage

50 40 30 20 10 0 0

15

30

45

60

75

90 105 120 135 150 165 180

time(minute)

Fig. 2. CPU utilization chart

As shown in Fig. 2, in the first hour, the CPU utilization gradually increases. When it reaches the first peak of 65, the CPU utilization begins to decline. In the second hour, the CPU utilization is basically around 65, and the CPU fluctuates around the first peak 65. In the third hour, the CPU utilization begins to decline. The CPU occupancy peak test shows that the system can basically meet the needs of a large number of users online at the same time, and the system has good stability. 4.2 Development Characteristics of Virtual Reality Technology Virtual reality technology is a kind of three-dimensional virtual world and real environment established by computer and information technology. In the environment of computer virtual reality, the user’s computer can enter the virtual environment through the manual operation and participation of the user, and get the feeling of being in the scene both visually and audibly. The information technology of virtual computer virtual reality and information technology provide our computer and modern industrial users with an interactive three-dimensional virtual world and a real virtual living environment visually. They can interact with any object in the virtual environment world independently, so that users can produce a variety of comprehensive feelings and experiences including vision, hearing and touch. Generally speaking, virtual world and reality technology should have good immersion, autonomy and good interaction in their use. The combination of the two makes users produce a concept similar to reality, that is, the three main characteristics of virtual reality: interactivity, immersion and imagination. The development of virtual reality technology is very fast, and its application fields and prospects are also very broad. From the current development of information technology, the network has entered people’s life, work and learning. At the same time, due to the continuous progress of modern computer image compression and video display processing technology and the continuous improvement of network corresponding software and hardware and equipment, it is not difficult to judge and predict the future development trend of virtual reality network technology. This development trend can roughly include two main development directions: business exhibition, education and training, simulation games and so on. Because the hardware requirement of desktop virtual reality is relatively low, it can be realized by a single PC. At the same time, due to

366

Y. Yan et al.

the rapid development of Internet, desktop virtual reality will be more closely combined with it, because in many high-tech fields, such as aerospace, military training, simulation training, due to various special requirements, only simulation experiments can be carried out. Simple desktop virtual reality can no longer meet the requirements, and can only build high-performance immersive virtual reality. At present, many high-tech virtual reality simulation systems have been established at home and abroad.

5 Conclusions This paper is based on the virtual reality technology of three-dimensional scenic roaming system research, with the development of the times, computer technology and information technology, virtual technology is gradually applied in people’s daily life, so, in order to improve their core competitiveness, follow the development of the times, ready to combine virtual reality technology with the three-dimensional model of scenic spots To make it more convenient for users to visit scenic facilities and buildings. In this paper, through the method of virtual reality modeling and roaming, combined with the specific situation of the scenic spot, the three-dimensional model of the scenic spot is established, and the real-time scene roaming system is designed. In this way, users can better interact with the virtual environment. Acknowledgements. This work was supported by Jilin Engineering Normal University— technologies of Three-Dimensional Scenic Spot Roaming System Based on Virtual Reality Technology. And this work was supported by the college students innovations special project funded by Jilin Engineering Normal University.

References 1. Bastug, E., Bennis, M., Medard, M., et al.: Toward interconnected virtual reality: opportunities, challenges, and enablers. IEEE Commun. Mag. 55(6), 110–117 (2017) 2. Nieder, G.L., Scott, J.N., Anderson, M.D.: Using quicktime virtual reality objects in computeassisted instruction of gross anatomy: Yorick—the VR Skull. Clin. Anat. 13(4), 287–293 (2015) 3. Jeavons, A.: What is artificial intelligence? Res. World 2017(65), 75 (2017) 4. Raza, M.Q., Khosravi, A.: A review on artificial intelligence based load demand forecasting techniques for smart grid and buildings. Renew. Sustain. Energy Rev. 50, 1352–1372 (2015) 5. Bundy, A.: Preparing for the future of artificial intelligence. AI Soc. 32(2), 285–287 (2017) 6. David, B.: Computer technology and probable job destructions in Japan: an evaluation. J. Japanese Int. Econ. 43, 77–87 (2017)

Research and Development of Simulation System for Industrial Robot Stamping Automation Production Line Based on Virtual Reality Songqing Liu(B) and Ying Chen College of Mechanical Engineering, Jilin Engineering Normal University, Changchun 130052, Jilin, China [email protected]

Abstract. With the increasing demand for automation of production lines, robots are increasingly used in industrial production, making robot production line simulation technology a hot research topic. The virtual test run system of the robot is based on the layout plan of the robot production line to carry out three-dimensional visual simulation of the production line, to verify the rationality of the layout plan, and to avoid unnecessary losses caused by blind production. However, the current research on simulation software is lacking, so the research of robot virtual trial operation system has important significance for domestic industrial development. The purpose of this paper is to use the virtual prototype to solve the problems in the design stage before manufacturing the physical prototype of the stamped product, and contribute to the research of the robotic stamping automation production line. This paper is mainly based on the advantages of high flexibility of robot stamping production line, low mold requirements, simple programming of new workpieces, virtual prototyping technology, computer science and other disciplines, physical simulation, full simulation, and finally the same physical prototype test production method. Keywords: Stamping production line · Virtual prototype technology · ADAMS · Simulation research

1 Introduction Since the press needs to wait for the robot to complete the corresponding command, resulting in low production efficiency, the clutches and brakes of the press are frequently turned on and off, reducing the service life. Therefore, it is crucial to optimize the coordination mode of the press and the robot movement to improve the tempo and smoothness of the production line. In recent years, research on stamping production lines has attracted widespread attention. In 2016, QiuXuesong et al. [1] used a multi-software co-simulation strategy of interface technology to establish a mathematical model of the press line in order to study the large-scale robotic stamping production line. In 2016, Wang Yannian et al. [2] © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 367–373, 2021. https://doi.org/10.1007/978-3-030-62746-1_54

368

S. Liu and Y. Chen

proposed a design scheme of the three-dimensional feeding robot control system based on the joint control of PLC and motion controller in order to improve the automation degree of the press production line. In 2017, Fang Shihui et al. [3] realized the full automatic production of water heater liner molding in order to improve the traditional production mode of water heater liner, through robot substitution and logic timing control. The system has perfect production monitoring, data statistics function and safety. The control mechanism shows that the system has high production efficiency and good product quality. In 2018, Han Xiaoyu et al. [4] used the bending manipulator of the fixture to design the punching manipulator, and used the bending manipulator as an example to analyze the kinematics. In recent years, the development of virtual prototyping technology has gradually matured, and many researchers have studied it. In 2017, Zhao Ruiwen et al. [5] used the ADAMS software to establish a virtual prototype model of the welding robot in order to study the time-varying force of the components in the actual work of the welding robot. In 2017, Zhang Wenhua et al. [6] used the three-dimensional modeling software UG to establish a wheeled tractor solid model in order to verify the roll stability of the virtual prototype technology, and judge the maximum rollover stability angle of the tractor by analyzing the tire force curve. In 2017, in order to solve the friction and wear problem of the motion gap, Zhang Ruiqiu et al. [7] used the 3D modeling software and the virtual simulation software to establish the plane mechanism model with the motion pair clearance, and carried out the dynamics simulation. In 2018, Ma Jianguo et al. [8] used the hybrid vibration isolation platform for theoretical calculation and modal analysis to obtain the characteristics and design parameters of the active-passive hybrid vibration isolation system. The variable-step method was used to control the active-passive hybrid vibration isolation system. The secondary channel identification is carried out. In this paper, by proposing a new method of robot and skin machine motion [9, 10], the evaluation index of the program has also been improved. There are also specific principles for the determination of the interference threshold. At the same time, combined with the modal analysis results and the actual motion of the press, three matching schemes are obtained. The new method of robot and press motion coordination has certain practicability for lifting rhythm and provides reference for engineering application [11, 12].

2 Methods 2.1 Define Sports Synergy Evaluation Indicators Good press and robot motion coordination methods must properly improve production efficiency on the basis of meeting the requirements of motion stability. (1) Slowest equipment utilization Equipment utilization is a problem that companies care about and is directly related to productivity. Equipment utilization refers to the ratio of actual equipment operating time to total production time. If the equipment utilization rate is too large, it may cause the production line to break. If the equipment utilization rate is too small, it will cause

Research and Development of Simulation System

369

the production line to accumulate. It is necessary to properly improve the equipment utilization rate based on the coordination of the press and the robot movement to accelerate the production cycle. Defining the slowest device utilization is as follows, E=

Tu × 100% Tb

Tb = Tq + T x

(1.1) (1.2)

In the formula, Tu is the time when the press is operated above the interference critical line; Tb is the time required for the crankshaft to run one week; Tq is the feeding time of the loading robot; Tx is the unloading time of the unloading robot. On the basis of other conditions, the larger the value of E, the better the utilization of the device is proved, and on the contrary, the worse. (2) Interference incidence In the press line, the occurrence of dryness can lead to major safety accidents. Checking for interference is a prerequisite for all subsequent work. Interference on the press line mainly occurs between the press and the robot, and the loading and unloading robot. The interference between the press and the robot can be eliminated by the interference height of the press. The ADAMS software dry check function can check for interference between adjacent parts. However, the parameter setting is optimal during the simulation process. In reality, due to the existence of factors such as the production environment, an object that does not interfere during simulation may cause interference during actual motion. The expression of the incidence of interference is: ε=

R Hmin

× 100%

(1.3)

Where Hmin is the minimum distance between the end of the robot and the height of the upper slider between the press and the height of the upper slider; R is the stroke of the slider of the press; the larger ε, the safer. 2.2 Virtual Prototype Simulation of Stamping Automated Production Line The simplified robot is mainly composed of a base, a shoulder, a waist, and a wrist. Convert the virtual loaded press and robot CAD model into a neutral file and import it into ADAMS to add constraints and drivers. The robot adds a rotating pair and a drive between each link, and a total of six rotating pairs and six drives form a six-degree-offreedom robot. The first three degrees of freedom determine the picking position, and the last three degrees of freedom do the picking attitude. (1) Geometric drawing method Because of the six-degree-of-freedom robot, the first three degrees of freedom determine the position of the grabbing material, and the last three degrees of freedom determine the attitude of the robot, so the workspace is determined by the first three degrees

370

S. Liu and Y. Chen

of freedom. The base of the robot is 120 mm high, the waist is 230 mm, the shoulder is 136.8 mm, and the elbow is 377.7 mm. Range of robot waist angle θ1 [−240°, +240°], range of shoulder pitch angle θ2 [−120°, +120°], range of elbow pitch angle θ3 [0°, + 161°], robot Workspace boundary curve determination method: ➀ Set p point as the reference point as shown. The set of all reachable spaces at point p is the workspace of the robot. ➁ The range of the waist rotation angle θ1 [−240°, +240°], the base radius is 131 mm, the robot is horizontally oriented to the left position, the clockwise rotation is 240° to the left limit, and the counterclockwise rotation is 240° to the right limit., you can determine the top view of the p point action range. ➂ The range of shoulder pitch angle θ2 [−120°, +120°]. Straighten the shield and elbows, with the vertical up to zero position, the J3 joints do not move, the J2 joints turn 120° clockwise to reach the J2 right limit, and turn from the zero position to the left to 120° to J2 left limit. ➃ The range of the elbow pitch angle θ3 [0°, +161°]. Taking the left limit as the starting position, the J2 joints do not move, and the J2 joints rotate 161° counterclockwise to reach the right extreme position of the J3 joints, at which time the elbows are contracted in the shoulders. ➄ Starting from the final position of ➃ steps, the J3 joints do not move, and the J2 joints turn 240° clockwise. At this time, the J2 joints reach the left limit position, and the elbows are still in the contracted state. ➅ Starting from the final position of steps, the J2 joints do not move, and the J3 joints turn 161° clockwise. At this time, the J2 joints reach the left limit position, and the elbows are fully deployed. ➆ After the above steps, the pattern swept by p point is the boundary curve of the robot workspace. (2) Numerical analysis The numerical analysis method for solving the robot workspace is the most commonly used Monte Carlo analysis. The idea of Monte Carlo analysis is to first establish a probability model, the number of parameters is equal to the number of joint variables, then randomly extract the joint variables of the robot, and substitute the values into the position equation of the reference point of the robot end, thus obtaining An approximate solution to the robot workspace. The principle expression is: W (p) = {w(q) : q ∈ Q} ⊂ R3 (qi ,min ≤ qi ≤ qi ,max )

(1.5)

Where W(p) is the robot workspace; p is the reference point; q is the joint variable; w(q) is the joint variable function; Q is the joint space; R3 is the three-dimensional space.

3 Results and Discussions? 3.1 Analysis of Results of Exercise Coordination Program According to the set evaluation criteria, different schemes for the two feasible interference thresholds were evaluated. The evaluation results are shown in Table 1. As can be seen from Table 1, the best solution is option 2.

Research and Development of Simulation System

371

Table 1. Scheme evaluation index results Evaluation index

Option I Option II Option III

Slowest device utilization E

62.5%

Interference rate ε

23.6%

Equipment overlap utilization k 40%

62.5%

62.5%

41.6%

23.6%

20%

40%

The main solution steps of the Monte Carlo analysis robot workspace combined with the software are shown in Fig. 1.

Fig. 1. Robot workspace solution steps

372

S. Liu and Y. Chen

3.2 Robot Trajectory Planning Method (1) Linear interpolation method The plane space has two points p1 and p2 , the coordinates of the starting point p1 are [x1 , y1 , z1 ], the coordinates of the ending point p2 are [x2 , y2 , z2 ], the speed of the linear motion v, the number of interpolations N, and the task of the trajectory is to require the end of the robot to follow the point p1 at a constant speed. Move straight to point p2 . Obtained by the linear displacement motion formula; ⎧ ⎪ ⎨ x = (x2 − x1 )/(N + 1) y = (y2 − y1 )/(N + 1) (1.6) ⎪ ⎩ z = (z 2 − z1 )/(N + 1) It can be seen from Eq. (1.6) that for any point pi (1 ≤ i ≤ N) on the line, the coordinate of pi is [xi , yi , zi ], then ⎧ ⎪ ⎨ xi = x1 +x · (i − 1) yi = y1 +y · (i − 1) (1.7) ⎪ ⎩ zi = z1 +z · (i − 1) (2) Planar circular interpolation In the plane coordinate system, there is a clockwise arc with a coordinate of 00 [x0 , y0 , z0 ], the starting point of the arc is A[x1 , y1 , z1 ], the end point is B[xN+1 , yN+1 , zN+1 ], the radius is R, the arc center angle is θ, and the starting angle is α (referring to the arc starting point A and The angle between the line connecting the center of the circle and the Y axis), the number of interpolations is N, θ = θ/N + 1). According to the arc calculation formula, ⎧ ⎨ xa = x0 +R · sin α y = y0 +R · cos α (1.8) ⎩ a z a = z0 Then any point on the arc pi [xi , yi , zi ] (1 ≤ i ≤ N), ⎧ ⎨ xi = x0 + R · sin[α + (i − 1) · θ] y = y0 + R · cos[α + (i − 1) · θ] ⎩ i zi = z0

(1.9)

4 Conclusion As the most powerful multi-body dynamics simulation software, ADAMS software is very suitable for studying the kinematics analysis of robots. By studying the motion characteristics of the robot from different directions through virtual prototyping technology, it can provide reference data for the final trajectory optimization.

Research and Development of Simulation System

373

Establish a complete virtual prototype simulation system for the complete stamping production line for T. Therefore, it is necessary to complete the simulation work of the robot workspace first, and provide the basis for determining the layout of the press and the robot. Then, the virtual prototype model of the stamping automated production line was completed in the ADAMS software, and the dynamic interference check of the virtual prototype model was completed. Finally, the virtual simulation work of the dual material detection system, the robot workspace control system and the grab weight control system on the stamping production line is completed by sensors and measuring tools.

References 1. Qiu, X., Xiao, C., Tan, H., Hou, Y., Zhou, Y.: Multi-software co-simulation of large robot stamping production line. China Mech. Eng. 27(6), 772–777 (2016) 2. Wang, Y., Ding, H.: Design of automatic feeding manipulator control system for multi-station stamping production line. Forging Technol. 41(6), 55–60 (2016) 3. Fang, S., Zhao, J., Li, F., Zhang, Z.:. Development of control system for drawing stamping automatic production line. Manuf. Automa. 39(6), 7–11 (2017) 4. Han, X., Ge, Z., Shen, J.: Design and kinematics analysis of reconfigurable stamping manipulators. Mach. Tool Hydraulics 46(21), 91–93 (2018) 5. Zhao, R., Tong, Y., Tan, Q., Wu, S., Li, D.: Simulation of welding robot based on virtual prototyping technology. Mech. Des. Manuf. Eng. 46(3), 36–40 (2017) 6. Zhang, W., Zhang, W., Lu, Z., Wang, B., Bang, T.: Study on roll stability of wheeled tractor based on virtual prototype technology. Mech. Strength 01, 141–145 (2017) 7. Zhang, R., Zhang, X., Sun, W.: Analysis of the motion accuracy of planar mechanism based on virtual prototyping technology. J. Graph. 38(2), 278–282 (2017) 8. Ma, J., Shuai, C., Li, Y.: Virtual prototyping technology for active and passive hybrid vibration isolation. J. Naval Univ. Eng. 30(05), 56–60 (2018) 9. Qian, Z.H., Feng, X., Li, Y., Tang, K.: Virtual reality model of the three-dimensional anatomy of the cavernous sinus based on a cadaveric image and dissection. J. Craniofac. Surg. 29(1), 1 (2018) 10. Chen, M., Saad, W., Yin, C.: Virtual reality over wireless networks: quality-of-service model and learning-based resource management. IEEE Trans. Commun. PP(99), 1 (2017) 11. Abdallah, K.A.A., Namgung, I.: Virtual reality development and simulation of bmi nozzle inspection system for use during regular refueling outage of apr1400 family of reactors. Ann. Nucl. Energy 116, 235–256 (2018) 12. Overbeck, R.S., Erickson, D., Evangelakos, D., Pharr, M., Debevec, P.: A system for acquiring, processing, and rendering panoramic light field stills for virtual reality. ACM Trans. Graph. 37(6), 1–15 (2018)

Architectural Roaming Animation Based on VR Technology Heng Yang(B) Wuxi Institute of Arts & Technology, Yixing, Jiangsu, China [email protected]

Abstract. Architectural design, as a kind of art, itself has a strong innovation, and when it found computer animation science and technology to express more ideal and unique artistic effects, architectural performance technology has made rapid progress in the development. As an important means of architectural expression, the virtual technology of architectural animation provides a new digital mode for the promotion of architectural image. Architectural animation virtual 3D film with its unique form of expression to establish a highly technical, humanized virtual space, has become a popular new technology field in the 21st century. The purpose of this paper is to study the application of architectural roaming animation based on VR technology. Based on the background and significance of the application of virtual reality technology in the construction industry, this paper briefly describes the definition of virtual reality, and then introduces two technologies of virtual reality collision detection and automatic pathfinding. Finally, Unity3D and C++ are used to design and implement the building roaming system. Through testing the system’s automatic pathfinding performance under different terminals, the pathfinding time on the computer end is the shortest, less than 100 ms. Keywords: VR technology · Architectural animation · Collision detection algorithm · Automatic pathfinding

1 Introduction Virtual tour of architecture is a technology with very good practical prospect [1]. At present, virtual tour technology of architecture has been applied in architectural design, public building projects, urban planning and design schemes, virtual landscape [2, 3]. From the perspective of technology, the biggest difficulty in virtual tour of architecture lies in the realistic sense of architectural scene rendering and the efficiency of scene real-time rendering [4]. In order to achieve better user immersion, the scenery presented in the architectural scene needs to be more real, so the model in the architectural scene needs to be constructed very carefully, but it takes a lot of time to build the model [5]. For such a fine and complex model, when it is transplanted to the roaming system, it is often difficult to achieve the effect of real-time roaming due to the restriction of machine hardware performance. Therefore, on the premise of satisfying the sense of reality and © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 374–380, 2021. https://doi.org/10.1007/978-3-030-62746-1_55

Architectural Roaming Animation Based on VR Technology

375

immersion of architectural scenes, how to reduce the complexity of scene models, reduce the number of polygons to be processed by the graphics system and realize real-time interaction has become a major topic in the research of computer graphics [6, 7]. Architectural animation is the best way to show the dynamic “visualization” of architecture [8]. In recent years, the development of computer graphics has led to the formation and development of three-dimensional representation technology of architecture, which is a technology that uses computer graphics and image processing technology to transform design data into images displayed on the screen [9]. Dynamic visualization of architectural effects has gathered the strengths of various industries in the field of design, providing designers, customers and the public with ornamental and interactive approaches to understand projects and products in advance [10]. Architectural animation virtual technology endowing people with a simulation, three-dimensional graphics world, using previously unimaginable visual means to obtain information to give play to their creative thinking, saving resources of architectural expression. Based on the background and significance of the application of virtual reality technology in the construction industry, this paper briefly describes the definition of virtual reality, and then introduces two technologies of virtual reality collision detection and automatic pathfinding. Finally, Unity3D and C++ are used to design and implement the building roaming system. Through testing the system’s automatic pathfinding performance under different terminals, the pathfinding time on the computer end is the shortest, less than 100 ms.

2 Architectural Tour Method 2.1 Virtual Reality Virtual reality VR for short, is a technology to adopt advanced technology of the computer technology as the core to form a kind of very vivid sensory experience a virtual environment, the experience to through the necessary input and output devices and the objects in the virtual environment interaction, mutual influence, and thus gain immersive experience and feelings. 2.2 Collision Detection Technology The Oriented Bounding Box (OBB) is an directional rectangular OBB with three edges located at arbitrary directions, and its direction depends on the model structure it surrounds. OBB is commonly expressed as the center point, the direction of the three edges, and the length of half of the three edges. The construction of OBB needs to utilize the triangle information of the model grid. If the three vertices of the ith triangle are (pi , qi , r i ), the mean µ and covariance matrix C of all triangle vertices are calculated as follows: 1  i i i (p , q , r ) 3n n

µ=

(1)

i=0

n 1  −i −i −i −i −i −i Cjk = (pj pk + qj qk + rj rk ) 1 ≤ j, k ≤ 3 3n i=0

(2)

376

H. Yang −





Where, n is the number of triangles, and pi = pi − µ, qi = qi − µ, r i = r i − µ represents each element in the third-order covariance matrix. C is a symmetric matrix whose three eigenvectors are orthogonal to each other. The three eigenvectors of C were unitized as the three coordinate axes of OBB, and the three side lengths of OBB were calculated according to the maximum interval of the projection of the model on the three coordinate axes. 2.3 Automatic Navigation Pathfinding Automatic navigation is an important function in the building roaming system involved in this paper. By selecting the target area, the system will display the moving route in the navigation map, so as to facilitate the user’s roaming in the building roaming system. Navigation is realized by combining with the preset script of Unity3D. The system firstly determines the target location according to user input, uses the pathfinding component in Unity3D to find the optimal route, and finally prompts the user to move through the friendly display interface. The following three conditions are required for the system to realize the automatic pathfinding function: The target location, which can be found in the virtual scene through the user’s input; For scenes that meet the requirements, the scenes in the system need to be set, which scenes can be set on foot and represented by subdividing the grid to meet the input requirements of pathfinding algorithm; Initial location. After the user sends a pathfinder request, the system will automatically find the pathfinder location information.

3 Experimental Design of Roaming System 3.1 Overall Design of Roaming System The function of the roaming system is to construct an indoor virtual scene with a sense of reality. The observer can change the viewpoint with mouse and keyboard to complete the roaming of the virtual scene. The construction technology of system key Technology Application framework The construction technology of realistic indoor virtual scene real-time interactive tour technology collision detection technology. In general, there are two major modules: the building module of virtual scene and the real-time roaming module. 3.2 Experimental Environment The hardware and software development environment of the building roaming system designed in this paper are shown in Table 1.

Architectural Roaming Animation Based on VR Technology

377

Table 1. Development environment

Software development environment

Hardware development environment

Name

Configuration

CPU

Pentiem(R)

RAM

16G

Graphics card

NVIDIA GeForce4

Hard disk

250G

Development platform

Windows 10

Development language

C++

Modeling software

Unity3D

4 Discussion of Experimental Results of Roaming System 4.1 Analysis and Discussion of Experimental Results In order to verify the cross-platform, efficient rendering and other characteristics of the system, this section will test the relevant performance of the system. (1) Render frame rate test In this paper, a smartphone using Android operating system, a smartphone using IOS operating system and a laptop with Windows7 system are selected to access the system. The test results of average rendering frame rate (unit FPS) of each scene when running the building roaming system with three terminals are shown in Table 2 and Fig. 1: Table 2. Test results of average rendering frame rate of each scene in the building roaming system Terminal

Single roaming

Many people roaming

Show scenes

Video playback

Android

50

35

60

24

IOS

50

48

60

24

Computer

60

60

60

60

It can be seen from Table 2 and Fig. 1 that the operating efficiency of the system is low in the process of multi-person roaming and video playing. System due to the need in the process of video playback at the same time rendering 3 d scene and will occupy more resources, at this point does not move as a background, the three-dimensional scene, and a broadcast frame rate of video resources greater than 24 FPS is very smooth, so a run on the mobile side frame rate control at 24 FPS can ensure smooth operation of the system at the same time, effectively reduce the system resource. In the process of multi-person roaming, the system needs to render more 3D content in real time, and the rendering frame rate will be affected by the hardware performance of the system.

378

H. Yang

70 60

test value

50 40 30 20 10 0 Android Single roaming

IOS

Computer

terminal

Many people roaming

Show scenes

Video playback

Fig. 1. Test results of average rendering frame rate of each scene in the building roaming system

(2) Pathfinding time test results In addition, the pathfinding function of the system was tested in this paper. The pathfinding time (in milliseconds) at different distances using three different terminals is shown in Fig. 2. 1000

test value

800 600 400 200 0 Android In 100

IOS

terminal

In 500

Computer In 1000

Fig. 2. Pathfinding time at different distances

It can be seen from Fig. 2 that system pathfinding time is closely related to hardware performance and increases with the increase of pathfinding distance. The pathfinding time on the mobile side, though much longer than on the PC side, is still within a relatively short time range. Moreover, the map on the mobile end uses less grid display, and the number of grids occupied by the mobile end is less than that on the PC end in the virtual scene, so the difference in efficiency is not obvious.

Architectural Roaming Animation Based on VR Technology

379

4.2 Suggestions on Rational Use of Virtual Reality Technology in Architectural Animation (1) Reasonable expression of intention First of all, virtual reality technology, as a new technology, is for the production of services, reasonable use of technology is conducive to express the intention of the designer quickly and accurately. In the process of architectural animation production, it is necessary to avoid the phenomenon of focusing on technology while ignoring animation art. Secondly, the use of virtual reality technology to produce architectural animation requires both “reality” in life and artistic processing. When making urban planning animation and real estate promotion animation, not only should the scene in the planning be completely reproduced, but also the animation should be processed with the lens language, color language and sound to make the audience understand relevant information in a relaxed and joyful audiovisual environment. (2) Determine the planning scheme Any architectural animation virtual film works should have a distinctive theme design, so as to attract people, so before the production of the idea of creation is very important, otherwise only rely on excellent 3D rendering effect is far from enough. Conceptual design is primarily determine the key works to express architectural aesthetics performance, for each animation works we will be organized by the project manager, group discussion developed animation production team performance plan, by professional planners to design thinking animation Angle this idea, expressed in the form of written language, will be in the form of a shooting rough sketches design simple first represented in a single frame painting. If you’re just making some simple animations, you should just have a rough outline of the script in your head. If you’re going to do some big ones, you should do it. A large building project needs multi-field cooperation, so we will draw more detailed sketches for communication.

5 Conclusion In general, the virtual reality technology is a can bring many convenience to mankind and the benefits of high and new technology, combination of architectural animation performance, makes the building designer to update perspective on all aspects of design, deliberate plan form, materials and space feeling at the same time, attaches great importance to the emerging architectural animation technology performance in aided architectural design aspects of the application and development, and has made great development, in recent years, our country also in vigorously introduce and the development of this technology. Construction of our country animation industry is still in the fledgling experiment exploration stage, the high-tech efficiency of emerging technologies at the same time also have considerable technical level and challenging, still there are many unresolved technical problems and theoretical problems, so we should constantly rich professional knowledge, have the courage to practice, more need our this generation of young people

380

H. Yang

continuously, passion and energy into our personality, talent and enthusiasm, to accomplish very personalized color architectural animation works, bring people a new way of creation and new experience, for our country’s construction industry and make great contributions to art. Acknowledgement. (1) 2018 Jiangsu Province Elite research and training of teachers’ professional leaders in Colleges (Visiting scholar of Tongji University) Project Number: 2018GRFX063. (2) This paper is 2018 Wuxi Institute of Arts & Technology reform in education projects, (Practice and Research on digital innovation project of ancient buildings around Taihu Lake in 3D animation teaching). Project Number: 19kt108. (3) Wuxi modern apprentice and Wuxi Vocational Education excellence course (Three dimensional scene production》 Project Number: 19kc202.

References 1. Lau, K.W., Kan, C.W., Lee, P.Y.: Doing textiles experiments in game-based virtual reality. Int. J. Inf. Learn. Technol. 34(3), 242–258 (2017) 2. Jinsoo, A., Young, K., Ronny, K.: Virtual reality-wireless local area network: wireless connection-oriented virtual reality architecture for next-generation virtual reality devices. Appl. ences 8(1), 43 (2018) 3. Mendez, R., Flores, J., Castello, E., et al.: New distributed virtual TV set architecture for a synergistic operation of sensors and improved interaction between real and virtual worlds. Multimed. Tools Appl. 77(15), 18999–19025 (2018) 4. Elbamby, M.S., Perfecto, C., Bennis, M., et al.: Towards low-latency and ultra-reliable virtual reality. IEEE Network 32(2), 78–84 (2018) 5. Ji, X., Fang, X., Shim, S.H.: Design and development of a maintenance and virtual training system for ancient Chinese architecture. Multimed. Tools Appl. 77(22), 29367–29382 (2018) 6. Dash, A., Lahiri, U.: Design of virtual reality-enabled surface electromyogram-triggered grip exercise platform. IEEE Trans. Neural Syst. Rehabil. Eng. 28(2), 444–452 (2020) 7. Satja, S., Matija, R., Joseph, C., et al.: Collision detection for underwater ROV manipulator systems. Sensors 18(4), 1117 (2018) 8. Jung, B.J., Moon, H.: Development of collision detection method using estimation of cartesian space acceleration disturbance. J. Korea Robot. Soc. 12(3), 258–262 (2017) 9. Tang, Y., Hou, J., Wu, T., et al.: Hybrid collision detection algorithm based on particle conversion and bounding box. Harbin Gongcheng Daxue Xuebao/J. Harbin Eng. Univ. 39(10), 1695–1701 (2018) 10. Gao, L.: Application of collision detection algorithm in 2D animation design. Revista de la Facultad de Ingenieria 32(14), 467–472 (2017)

The Measurement Method of Housing Affordability Fang Yang(B) and Lingni Wan Department of Business Administration, Wuhan Business University, Wuhan, Hubei, China [email protected]

Abstract. According to the data of China’s economic blue book in 2010, 85% of the families have difficulties in housing payment. Therefore, the key problem in identifying housing poverty is to determine the purchasing power of commercial housing and the measurement method. This paper introduces several commonly used methods of housing affordability measurement, and analyzes the application scope, advantages and disadvantages of various methods. Keywords: Housing affordability · Measurement method · Family income

1 Introduction Generally, there are two ways to determine the purchasing power of commercial housing. One is to measure the proportion of housing consumption in household income, and stipulate a certain proportion as the evaluation standard. If the ratio is lower than this ratio, it will be difficult to pay. Scholars advocate the use of such methods, such as: housing expenditure income ratio, house price income ratio, rent income ratio and so on. The second is the income balance evaluation method to measure the balance between the residual income after deducting the basic living expenses and the cost of housing consumption expenditure. The third method is to identify the income level of the public rental housing applicants by taking the household income measurement unit lower than the division basis multiple or a certain percentage set by the region itself. So, which method is the most effective way to calculate the family income limit is the focus of the public rental housing affordability screening index [1–4]. 1.1 House Price Income Ratio (PIR) House price income ratio refers to the ratio of the total price of a house to the annual income of urban residents. The housing price to income ratio directly reflects the residents’ purchasing power to the existing housing. The average housing price income ratio of a country is usually calculated by the ratio of the average price of a house to the average annual household income: PIR =

s×n×p Ph = t n×a

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 J. MacIntyre et al. (Eds.): SPIoT 2020, AISC 1283, pp. 381–387, 2021. https://doi.org/10.1007/978-3-030-62746-1_56

(1)

382

F. Yang and L. Wan

In the formula, PIR is the ratio of house price to income, PIR has two variables: the total price of each house Ph and the annual total income of each family, I, s is the per capita housing area, n is the average population of each household, p is the average selling price of houses per unit area, and a is the annual per capita income. The larger the ratio of house price to income is, the weaker the housing payment ability is, and the more difficult it is to buy a house. On the contrary, the opposite is true. Although PIR is a universal index to evaluate housing affordability in the world, there is no reasonable and strict regulation on its index range. According to the experience of the world bank and developed countries, it is considered that the reasonable ratio of the total house price to the annual income of the residents should be maintained in the range of 3–6 times. If the ratio exceeds 6 times, it is considered that the house price is too high and the residents have difficulties in housing payment [5]. According to the data released by Shanghai E-House Real Estate Research Institute, the price to income ratio of 35 large and medium-sized cities in China in 2015 shows that: From 1998 to 2015, the trend of China’s housing price income ratio was from 1998 to 2003, and the housing price income ratio basically maintained at the range of 6.6–6.9. From 2004 to 2010, the housing price income ratio rose to 9.2, and then fell back to 8.7 in 2015. From the perspective of trend, before 2004, the housing price income ratio basically maintained a stable state, which can reasonably reflect the national housing price income ratio. The report holds that the upper limit of the reasonable range of China’s house price income ratio should be kept within 7, and the range deviating from the reasonable value is 3%. 2016 ranking of deviation degree of housing price income ratio in 35 large and medium-sized cities. 1.2 Rent to Income Ratio (RIR) The biggest difference between the rent income ratio and the housing price income ratio is reflected in the form of the existing housing property rights owned by the residents, whether they own or rent. The ratio of rent to income refers to the ratio between the annual average rent paid by the family for renting housing and the annual disposable income of the family. It is the most direct indicator to measure the affordability of families who apply for public rental housing. The formula of rent income ratio can be expressed as follows: 12 × r × s R = (2) RIP = A n×a RIR is the ratio of rent to income, R is the average rent of a year, A is the annual disposable income of the family, r is the unit rent per square meter, s is the rental area, n is the number of households, a is the annual per capita disposable income of tenants. The value of RIR ratio reflects the degree of difficulty in rent payment. The smaller the RIR ratio is, the stronger the ability of rent payment is, and the greater the ratio is, the more difficult it is to pay rent [6–9]. 1.3 Residual Income Affordability (RIA) Income balance evaluation method, also known as residual income method, refers to the difference between the residual income after deducting the basic living expenses

The Measurement Method of Housing Affordability

383

and the cost of housing consumption expenditure. It takes the premise that the housing consumption does not affect the basic living standard of the family. It can directly reflect the people’s affordability of housing consumption expenditure. The income balance evaluation method consists of three key factors: disposable income, basic living expenditure and housing consumption expenditure. Basic living expenditure refers to the most basic consumption expenditure to ensure the family to meet its own survival and healthy life, including the expenditure on food, clothing, transportation and communication, daily necessities and services. Housing consumption expenditure refers to the cost of buying or renting a house. Therefore, the housing consumption expenditure and living consumption expenditure in the residual income method are generally used to meet the basic housing consumption expenditure and basic living expenditure value. The income balance evaluation method is expressed as: I = C + H

(3)

RIA = I − C

(4)

It is the annual per capital disposable income of the family, C is the annual basic living consumption expenditure of the family, h is the annual basic housing consumption expenditure of the family, and RIA is the annual residual income. When RIA ≥ H or RI-H ≥ 0, it means that the residual income of the family is enough to pay for the basic housing consumption of the family, the housing affordability is strong, and there is no housing payment difficulty. When RI ≤ H, or RI-H ≤ 0, it means that the non housing consumption of the family is too high, the family housing burden is heavy, the surplus income is not enough to pay for the basic housing consumption of the family, the housing demand can’t be solved through their own ability, and there is housing payment difficulty [10]. 1.4 Housing Affordability Index (HAI) According to the upper limit requirement of housing consumption proportion (the proportion of housing consumption expenditure to income), the American Association of real estate agents (APA) proposed to use the housing affordability index to evaluate the affordability of households in the housing market with median income level to live in the median house price. It is a very mature foreign real estate market analysis index, which is used to evaluate the ability of typical income families to afford typical housing prices. The HAI index is released once a month to reflect the change of the family’s ability to pay for housing in real time. The specific calculation formula is as follows: HAI =

1 1 × 100% = × 100% Ha Pm × 4 × 12

Pm = Ph × 0.8 ×

R n×12 (1 + 12 ) R = R n×12 12 (1 + 12 ) −1

(5) (6)

The median level of family’s annual income is expressed by I, and the housing price at the median level is expressed by H; Ha is the monthly income qualification line of

384

F. Yang and L. Wan

the family, that is, the housing affordability of the median price level; the principal and interest of the housing mortgage loan repayable by the family every month is expressed by Pm; the annual interest rate level of medium and long-term housing mortgage loan is expressed by R, and the loan term is n years. The basic idea of HAI index proposed by the American Association of real estate brokers is: it is usually assumed that the household housin